Five New Requirements Under New York DFS Cybersecurity Regulation Go Into Effect on September 1, 2018

Aug 10, 2018

Reading Time : 2 min

DFS has not yet provided guidance as to when it will begin to penalize noncompliance with the Regulation, or what penalties may look like. Absent additional insight, covered entities would be wise to take action now to ensure they are in compliance with the Regulation.

  1. Audit Trails – Section 500.06 requires all non-exempt covered entities to maintain systems to facilitate reconstruction of material financial transactions and cybersecurity audit trails, and to retain related records for three to five years. Covered entities are expected to have systems in place to reconstruct material financial transactions sufficient to support the entities’ normal operations and obligations. Records related to these systems must be maintained for five years. Covered entities also must have audit trails designed to detect and respond to cybersecurity events that have a reasonable likelihood of materially harming any material part of their normal operations. Records related to these audit trails must be maintained for three years.

  2. Application Security – Section 500.08 requires all non-exempt covered entities to include in their cybersecurity programs written policies and procedures to (1) ensure secure development practices for internally-developed applications, and (2) to evaluate, assess, or test the security of externally-developed applications they utilize.

  3. Data Disposal Requirements – Section 500.13 requires all covered entities, including those covered by the limited exemption, to include in their cybersecurity programs policies and procedures for the secure disposal of nonpublic information that is no longer necessary for business operations or for other legitimate business purposes. Covered entities are permitted to retain such information if they are otherwise required to retain it by another law or regulation, or where targeted disposal is not reasonably feasible due to the manner in which the information is maintained.

  4. Monitoring Authorized Users’ Activity – Section 500.14(a) requires all non-exempt covered entities to implement risk-based policies, procedures, and controls to monitor the activity of authorized users and detect if those users are improperly using or tampering with nonpublic information. The definition of authorized users includes employees, contractors, agents or other persons who participate in a covered entity’s business operations and are authorized to access and use any information systems and data of the covered entity. As a result, this provision potentially requires the monitoring of a broad range of personnel.

  5. Encryption of Nonpublic Information – Section 500.15 requires all non-exempt covered entities to, as part of their cybersecurity program based on their risk assessments, implement controls, including encryption or use another effective alternative control, to protect all nonpublic information when held or transmitted over external systems by the covered entity. If they determine that encryption is infeasible either for information at rest or in transit, covered entities may only use an effective alternative control if the alternative is reviewed and approved by their chief information security officer. This encryption requirement is in keeping with developing best practices in some industries.

After September 1, the next and last of the Regulation’s rolling implementation deadlines is March 1, 2019 when all covered entities, even those subject to the limited exemption, are required to have a third party service provider policy in place. As of March 1, 2019, all provisions of the Cybersecurity Regulation will be in force.

Share This Insight

Previous Entries

Deal Diary

April 12, 2023

Read More

Deal Diary

2022-12-15

On December 14, 2022, the Securities and Exchange Commission (SEC) adopted amendments regarding Rule 10b5-1 insider trading plans and related disclosures. The amendments aim to strengthen investor protections concerning insider trading and to help shareholders understand when and how insiders are trading in securities for which they may at times have material nonpublic information (MNPI). In light of these amendments, issuers should review and revise, if needed, their insider trading policies and equity grant policies.

Read more.

...

Read More

© 2024 Akin Gump Strauss Hauer & Feld LLP. All rights reserved. Attorney advertising. This document is distributed for informational use only; it does not constitute legal advice and should not be used as such. Prior results do not guarantee a similar outcome. Akin is the practicing name of Akin Gump LLP, a New York limited liability partnership authorized and regulated by the Solicitors Regulation Authority under number 267321. A list of the partners is available for inspection at Eighth Floor, Ten Bishops Square, London E1 6EG. For more information about Akin Gump LLP, Akin Gump Strauss Hauer & Feld LLP and other associated entities under which the Akin Gump network operates worldwide, please see our Legal Notices page.