New York SHIELD Act Promises More Data Breach Enforcement, and International Reach
New York has brought itself into line with a number of states concerning how they define a data breach, and, where applicable, what substantive security controls they require.
July 26, 2019 at 12:10 PM
8 minute read
On July 25, the Governor signed into law Senate Bill 5575, the “Stop Hacks and Improve Electronic Data Security Act” (the SHIELD Act), which had passed the Legislature on June 17, 2019. The SHIELD Act was originally proposed in the 2017-2018 session, but died in committee. It returned with gusto in 2019: proposed in the Legislature in February and passing both houses in a little more than four months.
The SHIELD Act does two things, primarily: It amends New York's data breach notification statute, General Business Law §899-aa to update its definitions, and also creates a new §899-bb requiring substantive data security controls of any person or business that owns or licenses computerized data including the defined “private information” of a New York resident. In doing this, New York has brought itself into line with a number of states concerning how they define a data breach, and, where applicable, what substantive security controls they require. The SHIELD Act also adopts the approach of several states, including Massachusetts, Florida, and Nevada, which purport to extend their jurisdictional reach to any person or business, anywhere in the world, that owns or licenses data concerning a resident of that state. In this regard, New York has converted §899-aa into, and created a new §899-bb that functions as, a possession statute: If you process computerized private information concerning a New Yorker, you now fall under the statute's requirements.
This change in territorial scope, of course, vastly increases the pool of persons and entities that are subject to possible enforcement under §899-aa, and creates an entirely new ground for enforcement against this increased pool under §899-bb. The statute's expanded definition of “private information” also increases the likelihood of enforcement. Before the SHIELD Act, many security incidents involving New Yorkers would be reportable under other regulatory frameworks—for instance under another state's laws or the Health Insurance Portability and Accountability Act of 1996 (HIPAA), as amended—but would not be reportable under §899-aa. This is because, under §899-aa, the definition of “private information” that could give rise to a breach was limited to an identifier, such as name, number, or personal mark, plus Social Security number, driver's license number or non-driver identification card number, or account number, credit or debit card number, in combination with a code or password that would permit access to an individual's financial account.
The SHIELD Act expands this definition, adding username and password for an online account as well as biometric information. The SHIELD Act also makes clear that compromise of an account number, or credit or debit card number, even without compromise of an access code or password, is reportable, “if circumstances exist wherein such number could be used to access an individual's financial account without additional identifying information, security code, access code, or password.”
Missing from the definition of “private information,” but present in other states' data breach notification laws, are elements such as digital signature (North Carolina), passport number (Alabama), medical information (California), DNA profile (Delaware), and mother's maiden name (North Dakota). In addition, §899-aa remains focused on “computerized data,” with a paper breach remaining outside of its scope. The data breach notification requirements in Massachusetts, by contrast, have long treated paper and electronic breaches in the same fashion. See Mass. Gen. Laws ch. 93H §1(a) (including paper records within the scope of the Massachusetts data breach notification statute).
Section 899-aa also changes breach notification duties, including the notification trigger. Pre-amendment, §899-aa required notification to affected individuals “in the most expedient time possible and without unreasonable delay, consistent with the legitimate needs of law enforcement … or any measures necessary to determine the scope of the breach and restore the reasonable integrity of the system.” The SHIELD Act removes the “reasonable” qualifier from this definition, leaving the rest intact. It also creates a reporting exception for situations involving “inadvertent disclosure by persons authorized to access private information” if “such exposure will not likely result in misuse of such information, or financial harm to the affected persons or emotional harm in the case of unknown disclosure of online credentials.” A person or business taking advantage of this caveat must document its determination and maintain it for at least five years. If more than 500 New York residents are affected, the person or business must provide that written determination to the New York Attorney General within 10 days of making it.
In the new §899-bb, the SHIELD Act creates, for the first time, substantive security requirements for all persons or businesses that own or license the private information of a New York resident. In doing so, §899-bb threads the regulatory needle between states that simply require “reasonable” information security efforts, such as Delaware, without detailing specific safeguards that must be implemented, and those that prescribe more substantive policies and controls, such as Massachusetts. Section 899-bb does this by requiring “reasonable safeguards to protect the security, confidentiality and integrity of private information, but also providing criteria by which a person or business would be “deemed to be in compliance” with this generic requirement.
Specifically, a person or business covered under §899-bb can either show that it is a defined “compliant regulated entity,” or it can implement a data security program including certain administrative, technical, and physical safeguards identified in the statute. These include, under administrative safeguards, designating one or more employees to coordinate the program, identifying reasonably foreseeable internal and external risks to the organization, and adjusting the security program in light of business changes or new circumstances. In this regard, §899-aa is similar to both 201 C.M.R. 17.03 in Massachusetts and the Gramm-Leach-Bliley Act (GLBA) Safeguards rule, 16 C.F.R. §§314.3 and 313.4, which include nearly identical requirements.
In relation to technical and physical safeguards, §899-bb requires assessing risks in network and software design, testing and monitoring key controls, assessing risks of information storage and disposal, and disposing of private information within a reasonable amount of time after it is no longer needed. These too are familiar controls, borrowed generally from the New York Department of Financial Services cybersecurity regulations (23 N.Y.C.R.R. Part 500), the GLBA Safeguards Rule, or HIPAA.
As for a “compliant regulated entity,” §899-bb defines that term as any person or business subject to and compliant with the security requirements of GLBA, HIPAA, Part 500, or “any other data security rules and regulations of, and the statutes administered by, any official department, division, commission or agency of the federal or New York state government … .” Importantly, §899-bb does not include entities regulated under other state or international law as “compliant regulated entities.” Section §899-bb is also silent as to how an entity can prove that it is compliant with any of these regulatory schemes. Accordingly, because compliance is measured at a point in time, it is possible under §899-bb for a bank subject to GLBA or a hospital subject to HIPAA to fall out of compliance with their primary regulator, and therefore become ineligible for the “compliant regulated entity” caveat built into §899-bb.
As for enforcement, §899-bb expressly states that it does not create a private right of action, but enterprising litigants are certain to refer to its substantive security requirements as a new floor in New York, at least when alleging negligence in relation to a data breach. Further, §899-bb makes violations of its provisions a violation of the state's “little FTC Act,” N.Y. Gen. Bus. Law §349. In many states, including in New York, this has been common practice, using unfair and deceptive acts and practices laws to enforce or investigate in relation to a data breach. If there was any question as to this practice in New York, §899-bb now codifies it.
Given this added support to enforcement efforts, the vastly expanded reach to §899-aa, and the new provisions of §899-bb—which potentially cover entities regulated under other security frameworks such as GLBA and HIPAA, inasmuch as they are out of compliance with those frameworks—the SHIELD Act will certainly bring more enforcement, as well as an increase in breach reporting in New York. Many would welcome this development, as reporting obligations in New York have lagged behind other states. Others will feel the pinch of the new requirements, especially concerning reasonable data security safeguards, as they may not have not been required by law to engage in such practices before. Whatever the reception, enforcement will show just what the state expects under these requirements, which will remain fluid until defined in more detail in practice, either via enforcement efforts and consent decrees, or in the courts.
F. Paul Greene is a partner and chair of the privacy and data security practice group at Harter Secrest & Emery, a full-service business law firm with offices throughout New York. He can be reached at [email protected].
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2025 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllShifting Sands: May a Court Properly Order the Sale of the Marital Residence During a Divorce’s Pendency?
9 minute readTortious Interference With a Contract; Retaliatory Eviction Defense; Illegal Lockout: This Week in Scott Mollen’s Realty Law Digest
Court of Appeals Provides Comfort to Land Use Litigants Through the Relation Back Doctrine
8 minute readTrending Stories
- 1'Ridiculously Busy': Several Law Firms Position Themselves as Go-To Experts on Trump’s Executive Orders
- 2States Reach New $7.4B Opioid Deal With Purdue After SCOTUS Ruling
- 3$975,000 Settlement Reached After Fall on Sidewalk
- 4'Where Were the Lawyers?' Judge Blocks Trump's Birthright Citizenship Order
- 5Big Law Sidelined as Asian IPOs in New York Are Dominated by Small Cap Listings
Who Got The Work
J. Brugh Lower of Gibbons has entered an appearance for industrial equipment supplier Devco Corporation in a pending trademark infringement lawsuit. The suit, accusing the defendant of selling knock-off Graco products, was filed Dec. 18 in New Jersey District Court by Rivkin Radler on behalf of Graco Inc. and Graco Minnesota. The case, assigned to U.S. District Judge Zahid N. Quraishi, is 3:24-cv-11294, Graco Inc. et al v. Devco Corporation.
Who Got The Work
Rebecca Maller-Stein and Kent A. Yalowitz of Arnold & Porter Kaye Scholer have entered their appearances for Hanaco Venture Capital and its executives, Lior Prosor and David Frankel, in a pending securities lawsuit. The action, filed on Dec. 24 in New York Southern District Court by Zell, Aron & Co. on behalf of Goldeneye Advisors, accuses the defendants of negligently and fraudulently managing the plaintiff's $1 million investment. The case, assigned to U.S. District Judge Vernon S. Broderick, is 1:24-cv-09918, Goldeneye Advisors, LLC v. Hanaco Venture Capital, Ltd. et al.
Who Got The Work
Attorneys from A&O Shearman has stepped in as defense counsel for Toronto-Dominion Bank and other defendants in a pending securities class action. The suit, filed Dec. 11 in New York Southern District Court by Bleichmar Fonti & Auld, accuses the defendants of concealing the bank's 'pervasive' deficiencies in regards to its compliance with the Bank Secrecy Act and the quality of its anti-money laundering controls. The case, assigned to U.S. District Judge Arun Subramanian, is 1:24-cv-09445, Gonzalez v. The Toronto-Dominion Bank et al.
Who Got The Work
Crown Castle International, a Pennsylvania company providing shared communications infrastructure, has turned to Luke D. Wolf of Gordon Rees Scully Mansukhani to fend off a pending breach-of-contract lawsuit. The court action, filed Nov. 25 in Michigan Eastern District Court by Hooper Hathaway PC on behalf of The Town Residences LLC, accuses Crown Castle of failing to transfer approximately $30,000 in utility payments from T-Mobile in breach of a roof-top lease and assignment agreement. The case, assigned to U.S. District Judge Susan K. Declercq, is 2:24-cv-13131, The Town Residences LLC v. T-Mobile US, Inc. et al.
Who Got The Work
Wilfred P. Coronato and Daniel M. Schwartz of McCarter & English have stepped in as defense counsel to Electrolux Home Products Inc. in a pending product liability lawsuit. The court action, filed Nov. 26 in New York Eastern District Court by Poulos Lopiccolo PC and Nagel Rice LLP on behalf of David Stern, alleges that the defendant's refrigerators’ drawers and shelving repeatedly break and fall apart within months after purchase. The case, assigned to U.S. District Judge Joan M. Azrack, is 2:24-cv-08204, Stern v. Electrolux Home Products, Inc.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250