The SHIELD Act: NY's New Data Protection Requirements Take Effect
In his Health Law column, Francis J. Serbaroli discusses New York's new SHIELD Act, which imposes new data security and data breach reporting requirements on any entity in possession of private information of New York residents regardless of whether the entity is located in New York. The Act also levies higher penalties for non-compliance with its data security and reporting requirements, but does not provide for a private cause of action.
November 25, 2019 at 11:30 AM
10 minute read
Major data breaches that jeopardize the confidential personal, financial and health information of millions of Americans continue to make headlines. Virtually all organizations—including government—that compile and store personal data are vulnerable, as are the contractors, vendors, and others with whom they share such data. Recently, a security breach at a medical collection agency serving hospitals and clinical laboratories compromised the confidential information of between 20-25 million patients, including patients at a major hospital system in New York City. A large upstate health system recently agreed to pay $3 million and take substantial corrective action after personal health information of patients was improperly disclosed as a result of the loss of an unencrypted flash drive and the theft of an unencrypted laptop computer.
Earlier this year, New York's Legislature enacted and Governor Andrew Cuomo signed into law the "Stop Hacks and Improve Electronic Data Security Act," or the "SHIELD" Act. (S.5575B/A.5635) The SHIELD Act adds important new requirements for businesses and organizations—including those throughout the health care sector—to safeguard personal and private information. The Act makes revisions to §899-aa and adds a new §899-bb to the General Business Law (GBL), and amends the State Technology Law.
Expanded Information Protected
The Act significantly expands the types of "private" information that must be protected, and the breaches that must be reported. The Act covers not only "personal information" currently defined in GBL §899-aa(1)(a) as:
any information concerning a natural person which, because of name, number, personal mark, or other identifier, can be used to identify such natural person … .
but also "private information" which is now defined as either:
(i) personal information in combination with any one or more of the following data elements that were not encrypted, or was encrypted with an encryption key but was accessed or acquired:
- social security number;
- driver's license number or non-driver ID card;
- account number, credit or debit card number in combination with any required security code, access code, password or other information that would permit access to an individual's financial account; or
- biometric information such as a fingerprint, voiceprint, retina or iris image, or other unique physical representation or digital representation of biometric data used to authenticate or ascertain the individual's identity.
(ii) a user name or e-mail address in combination with a password or security question and answer that would permit access to an online account; or
(iii) any unsecured protected health information held by a "covered entity" as defined in the Health Insurance Portability and Accountability Act of 1996 (HIPAA). Id. 899-aa(1)(b).
The Act expands the definition of a "breach" to include not only unauthorized acquisition of computerized private information maintained by a business, but also unauthorized "access" to such information (i.e., information that was viewed, communicated with, or altered without valid authorization or by an unauthorized person).
Compliance
The Act mandates the following data security requirement in a new GBL §899-bb(2):
Any person or business that owns or licenses computerized data which includes private information of a resident of New York shall develop, implement and maintain reasonable safeguards to protect the security, confidentiality and integrity of the private information including, but not limited to, disposal of data.
Rather than setting forth detailed safeguards for personal and private information, the Act states that a business will be deemed to be "in compliance" if:
(i) it is a compliant regulated entity:
- under the federal regulations promulgated pursuant to 15 U.S.C. 6801-6809 (Title V of the Gramm-Leach-Bliley Act);
- under the federal regulations implementing HIPAA and the Health Information Technology for Economic and Clinical Health Act (HITECH);
- under 23 NYCRR Part 500 ("Cybersecurity Requirements for Financial Services Companies") promulgated by the Department of Financial Services; and
- under any other data security laws and regulations of the federal and New York State governments;
(ii) it implements a data security program having reasonable administrative safeguards, such as:
- designates one or more employees to coordinate the security program;
- identifies reasonably foreseeable internal or external risks;
- assesses the sufficiency of safeguards in place to control the identified risks;
- trains and manages employees in the security program practices and procedures;
- selects service providers capable of maintaining appropriate safeguards, and requires those safeguards by contract; and
- adjusts the security program in light of business or new circumstances.
(iii) it implements a data program that has reasonable technical safeguards such as the following:
- assesses risks in network and software design;
- assesses risks in information processing, transmission, and storage;
- detects, prevents and responds to attacks or system failures; and
- regularly tests and monitors the effectiveness of key controls, systems and procedures.
(iv) it implements a data program that has reasonable physical safeguards such as the following:
- assesses risks of information storage and disposal;
- detects, prevents and responds to intrusions;
- protects against unauthorized access to or use of private information during or after the collection, transportation and destruction or disposal of the information; and
- disposes of private information within a reasonable amount of time after it is no longer needed for business purposes by erasing electronic media so that the information cannot be read or reconstructed. Id. §899-bb(2)(b).
A small business (fewer than 50 employees, less than $3 million in gross annual revenue in each of the last 3 fiscal years, or less than $5 million in year-end total assets) will be deemed in compliance:
if the small business's security program contains reasonable administrative, technical and physical safeguards that are appropriate for the size and complexity of the small business, the nature and scope of the small business's activities, and the sensitivity of the personal information the small business collects from or about consumers. Id. §899-bb(2)(c).
Violations
The Act declares a violation of its data security requirements to be a violation of GBL §349 which makes deceptive acts or practices unlawful. It authorizes the attorney general to bring an action to enjoin violations of the Act, and to obtain civil penalties of $5,000 per violation as set forth in GBL §350-d.
It is important to note that the Act specifically states that its data security requirements create no private right of action for any violations. Id. §899-bb(2)(e).
Reporting and Notification
The Act broadens the definition of "breach of the security of the system" to include not just acquisition but also access to data:
… unauthorized access to or acquisition of, or access to or acquisition without valid authorization of computerized data that compromises the security, confidentiality, or integrity of private information maintained by a business. Id. §899-aa(1)(c).
The Act cites as examples of access:
… indications that the information was viewed, communicated with, used or altered by a person without valid authorization or by an unauthorized person.
Such indications include:
- whether the information is in the physical possession and control of an unauthorized person, such as a lost or stolen computer or other device;
- whether the information has been downloaded or copied; or
- whether the information was used by an unauthorized person, such as fraudulent accounts opened or instances of identity theft reported.
The requirement to notify consumers in GBL §899-aa(2) has been amended to include unauthorized access to information, and it removes the previous limitation on the notice requirement to businesses located in New York:
Any person or business which owns or licenses computerized data which includes private information shall disclose any breach of the security of the system following discovery or notification of the breach in the security of the system to any resident of New York state whose private information was, or is reasonably believed to have been, accessed or acquired by a person without valid authorization. The disclosure shall be made in the most expedient time possible and without unreasonable delay, consistent with the legitimate needs of law enforcement … or any measures necessary to determine the scope of the breach and restore the integrity of the system.
The Act states that notification is not necessary if the exposure of private information was an "inadvertent disclosure by persons authorized to access private information" and a reasonable determination is made that such exposure will not likely result in misuse of the information, or financial or emotional harm. However, the person or business making such a determination is required to document it in writing and retain it for five years. If the exposure involves more than 500 residents of New York, the determination must be provided to the attorney general within 10 days after the determination is made. Id. §899-aa(2)(a-b).
The Act also states that it does not require notice to consumers if notice is already being given to consumers under other state or federal laws or regulations, such as HIPAA and HITECH. However, notice must still be provided to the attorney general, the Department of State and the state police.
The attorney general remains authorized to bring an action to enjoin and restrain the continuation of any violation of the breach reporting requirements, but the Act doubles the penalty recoverable by the attorney general from $10 to $20 per instance of failed notification, and increases the maximum penalty recoverable to $250,000 from $150,000. The Act also increases the time within which the attorney general may bring an action from two to three years.
Effective Dates
The SHIELD Act's amendments to the breach notification requirements took effect on Oct. 23, 2019. The law gives businesses until March 21, 2020 to comply with the amendments to its data security requirements.
State Agencies
The SHIELD Act also amends the State Technology Law by applying many of the new definitions, data security and breach notification requirements to state government agencies and entities.
Conclusion
The SHIELD Act covers any and all persons or entities that have the private information of New York residents regardless of size or whether they are actually located in New York. It applies to for-profits and not-for-profits. Virtually every health care provider and payor in New York is already required to abide by the HIPAA and HITECH regulations covering security of personal health information, but they must become familiar with the SHIELD Act's provisions and make appropriate revisions to their data security compliance policies and procedures. Vendors and contractors with which private information is shared must also get into compliance with the SHIELD Act's requirements.
Francis J. Serbaroli is a shareholder in Greenberg Traurig and the former vice chair of The New York State Public Health Council.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2025 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllJudgment of Partition and Sale Vacated for Failure To Comply With Heirs Act: This Week in Scott Mollen’s Realty Law Digest
Law Firms Mentioned
Trending Stories
- 1Uber Files RICO Suit Against Plaintiff-Side Firms Alleging Fraudulent Injury Claims
- 2The Law Firm Disrupted: Scrutinizing the Elephant More Than the Mouse
- 3Inherent Diminished Value Damages Unavailable to 3rd-Party Claimants, Court Says
- 4Pa. Defense Firm Sued by Client Over Ex-Eagles Player's $43.5M Med Mal Win
- 5Losses Mount at Morris Manning, but Departing Ex-Chair Stays Bullish About His Old Firm's Future
Who Got The Work
J. Brugh Lower of Gibbons has entered an appearance for industrial equipment supplier Devco Corporation in a pending trademark infringement lawsuit. The suit, accusing the defendant of selling knock-off Graco products, was filed Dec. 18 in New Jersey District Court by Rivkin Radler on behalf of Graco Inc. and Graco Minnesota. The case, assigned to U.S. District Judge Zahid N. Quraishi, is 3:24-cv-11294, Graco Inc. et al v. Devco Corporation.
Who Got The Work
Rebecca Maller-Stein and Kent A. Yalowitz of Arnold & Porter Kaye Scholer have entered their appearances for Hanaco Venture Capital and its executives, Lior Prosor and David Frankel, in a pending securities lawsuit. The action, filed on Dec. 24 in New York Southern District Court by Zell, Aron & Co. on behalf of Goldeneye Advisors, accuses the defendants of negligently and fraudulently managing the plaintiff's $1 million investment. The case, assigned to U.S. District Judge Vernon S. Broderick, is 1:24-cv-09918, Goldeneye Advisors, LLC v. Hanaco Venture Capital, Ltd. et al.
Who Got The Work
Attorneys from A&O Shearman has stepped in as defense counsel for Toronto-Dominion Bank and other defendants in a pending securities class action. The suit, filed Dec. 11 in New York Southern District Court by Bleichmar Fonti & Auld, accuses the defendants of concealing the bank's 'pervasive' deficiencies in regards to its compliance with the Bank Secrecy Act and the quality of its anti-money laundering controls. The case, assigned to U.S. District Judge Arun Subramanian, is 1:24-cv-09445, Gonzalez v. The Toronto-Dominion Bank et al.
Who Got The Work
Crown Castle International, a Pennsylvania company providing shared communications infrastructure, has turned to Luke D. Wolf of Gordon Rees Scully Mansukhani to fend off a pending breach-of-contract lawsuit. The court action, filed Nov. 25 in Michigan Eastern District Court by Hooper Hathaway PC on behalf of The Town Residences LLC, accuses Crown Castle of failing to transfer approximately $30,000 in utility payments from T-Mobile in breach of a roof-top lease and assignment agreement. The case, assigned to U.S. District Judge Susan K. Declercq, is 2:24-cv-13131, The Town Residences LLC v. T-Mobile US, Inc. et al.
Who Got The Work
Wilfred P. Coronato and Daniel M. Schwartz of McCarter & English have stepped in as defense counsel to Electrolux Home Products Inc. in a pending product liability lawsuit. The court action, filed Nov. 26 in New York Eastern District Court by Poulos Lopiccolo PC and Nagel Rice LLP on behalf of David Stern, alleges that the defendant's refrigerators’ drawers and shelving repeatedly break and fall apart within months after purchase. The case, assigned to U.S. District Judge Joan M. Azrack, is 2:24-cv-08204, Stern v. Electrolux Home Products, Inc.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250