•  Summary 
  •  
  •  Actions 
  •  
  •  Committee Votes 
  •  
  •  Floor Votes 
  •  
  •  Memo 
  •  
  •  Text 
  •  
  •  LFIN 
  •  
  •  Chamber Video/Transcript 

S01961 Summary:

BILL NOS01961A
 
SAME ASNo Same As
 
SPONSORGONZALEZ
 
COSPNSR
 
MLTSPNSR
 
Add §211, St Tech L
 
Establishes the "secure our data act"; relates to cybersecurity protection by state entities; requires the office of information technology services to develop standards for data protection of state entity-maintained information.
Go to top

S01961 Text:



 
                STATE OF NEW YORK
        ________________________________________________________________________
 
                                         1961--A
 
                               2025-2026 Regular Sessions
 
                    IN SENATE
 
                                    January 14, 2025
                                       ___________
 
        Introduced  by Sen. GONZALEZ -- read twice and ordered printed, and when
          printed to be committed to the Committee on Internet and Technology --
          recommitted to the Committee on Internet and Technology in  accordance
          with  Senate  Rule  6,  sec.  8 -- committee discharged, bill amended,
          ordered reprinted as amended and recommitted to said committee

        AN ACT to amend the state technology law, in  relation  to  establishing
          the "secure our data act"
 
          The  People of the State of New York, represented in Senate and Assem-
        bly, do enact as follows:
 
     1    Section 1. This act shall be known and may be cited as the "secure our
     2  data act".
     3    § 2. Legislative intent. The legislature finds that information  tech-
     4  nology  attacks  and breaches have compromised governmental networks and
     5  the electronically  stored  personal  information  of  countless  people
     6  statewide  and  nationwide.  State  entities often receive such personal
     7  information from various sources,  including  the  data  subjects  them-
     8  selves, other state entities, and the federal government.  Additionally,
     9  state  entities  use  such  personal  information to make determinations
    10  regarding data subjects.   New Yorkers deserve to  have  their  personal
    11  information  in the possession of a state entity stored in a manner that
    12  will withstand any attempt by a bad actor to access, alter, or  prohibit
    13  access to such information.
    14    Therefore,  the legislature enacts the secure our data act, which will
    15  require state entities to  employ  adequate  practices  and  systems  to
    16  protect  the  personal  information  from  any unauthorized acquisition,
    17  access, alteration or change in access.
    18    § 3. The state technology law is amended by adding a new  section  211
    19  to read as follows:
    20    §  211. Cybersecurity protection. 1. Definitions. For purposes of this
    21  section, the following terms shall have the following meanings:
 
         EXPLANATION--Matter in italics (underscored) is new; matter in brackets
                              [ ] is old law to be omitted.
                                                                   LBD05506-02-6

        S. 1961--A                          2
 
     1    (a) "Breach of the security of  the  system"  means  (i)  unauthorized
     2  exfiltration,  acquisition,  or acquisition without valid authorization,
     3  of computerized information which compromises  the  security,  confiden-
     4  tiality,  or  integrity of state entity-maintained personal information,
     5  (ii)  unauthorized  access,  or  access  without valid authorization, to
     6  state entity-maintained personal information or to an information system
     7  used for personal information, or (iii) unauthorized modification of the
     8  access permissions, including through  the  use  of  encryption,  to  an
     9  information system used for personal information. "Breach of the securi-
    10  ty  of  the system" does not include good faith acquisition of or access
    11  to personal information, or  access  to  an  information  system  by  an
    12  employee  or agent of a state entity for the purposes of the state enti-
    13  ty; provided that the private information or information system  is  not
    14  used  in an unauthorized manner, accessed for an unlawful or inappropri-
    15  ate purpose, modified to  change  access  permissions  without  authori-
    16  zation,  or  subject  to unauthorized disclosure. In determining whether
    17  state entity-maintained personal information or  an  information  system
    18  used  for personal information has been exfiltrated, acquired, accessed,
    19  or experienced a change in access permissions without  authorization  or
    20  without  valid authorization, such state entity may consider the follow-
    21  ing factors, among others:
    22    (1) indications that the information is in the physical possession and
    23  control of an unauthorized person, such as a lost or stolen computer  or
    24  other device containing information;
    25    (2) indications that the information has been downloaded or copied;
    26    (3)  indications  that  the  information  was  used by an unauthorized
    27  person, such as fraudulent accounts  opened  or  instances  of  identity
    28  theft reported; or
    29    (4)  indications  that  the  information  or  information  system  was
    30  accessed without authorization or without valid authorization, including
    31  but not limited to data in information system access logs, changes modi-
    32  fying access to the information or information system,  modification  or
    33  deletion  of  stored information, injecting or installing malicious code
    34  on the information system, or unauthorized encryption of stored informa-
    35  tion.
    36    (b) "Data subject" means the person who is the subject of the personal
    37  information.
    38    (c) "Data validation" means ensuring the accuracy, quality, and valid-
    39  ity of source data before using, importing, saving, storing,  or  other-
    40  wise processing data.
    41    (d)  "Immutable"  means  data  that  is  stored unchanged over time or
    42  unable to be changed. For the purposes  of  backups,  "immutable"  shall
    43  mean  that,  once ingested, no external or internal operation can modify
    44  the data and must never be  available  in  a  read/write  state  to  the
    45  client.  "Immutable" shall specifically apply to the characteristics and
    46  attributes of a backup system's file system and may not  be  applied  to
    47  temporary  systems  state,  time-bound  or  expiring  configurations, or
    48  temporary conditions created by a physical air gap as is implemented  in
    49  most  legacy systems, provided that immutable backups must be capable of
    50  deletion and replacement, as applicable, in  accordance  with  the  data
    51  retention  and  deletion  policy governing the data.   An immutable file
    52  system must demonstrate characteristics that do not permit  the  editing
    53  or  changing  of  any  data  backed up to provide agencies with complete
    54  recovery capabilities.
    55    (e) "Information system" means any  good,  service  or  a  combination
    56  thereof,  used  by any computer, cloud service, or interconnected system

        S. 1961--A                          3
 
     1  that is maintained for or used by a state  entity  in  the  acquisition,
     2  storage,  manipulation,  management, movement, control, display, switch-
     3  ing, interchange, transmission, or reception of data or voice including,
     4  but  not  limited  to, hardware, software, information appliances, firm-
     5  ware, programs, systems, networks, infrastructure,  media,  and  related
     6  material  used  to  automatically  and  electronically collect, receive,
     7  access, transmit, display, store, record, retrieve,  analyze,  evaluate,
     8  process, classify, manipulate, manage, assimilate, control, communicate,
     9  exchange,  convert,  coverage, interface, switch, or disseminate data or
    10  information of any kind or form.
    11    (f) "Mission critical" means information or information  systems  that
    12  are essential to the functioning of the state entity.
    13    (g)  "Segmented  storage" means the method of data storage whereby (i)
    14  information is partitioned or separated, with overlapping  or  non-over-
    15  lapping  protection,  and  (ii) such individual partitioned or separated
    16  sets of information are  stored  in  multiple  physically  or  logically
    17  distinct secure locations.
    18    (h)  "State  entity-maintained  personal  information"  means personal
    19  information stored by a state entity that was generated by a state enti-
    20  ty or provided to the state entity by the data subject, a state  entity,
    21  a  federal  governmental  entity, or any other third-party source.  Such
    22  term shall also include personal  information  provided  by  an  adverse
    23  party in the course of litigation or other adversarial proceeding.
    24    (i) "State entity" means any state board, bureau, division, committee,
    25  commission, council, department, public authority, public benefit corpo-
    26  ration, office or other governmental entity performing a governmental or
    27  proprietary function for the state of New York, except:
    28    (i) the judiciary; and
    29    (ii)  all cities, counties, municipalities, villages, towns, and other
    30  local agencies.
    31    2. Data protection standards. (a) No later than  one  year  after  the
    32  effective  date  of  this  section,  the  director, in consultation with
    33  stakeholders and other interested parties, which shall include at  least
    34  one public hearing, shall promulgate regulations that design and develop
    35  standards for:
    36    (i)  protection  against  breaches  of  the security of the system for
    37  mission critical information systems and for personal  information  used
    38  by such information systems;
    39    (ii) data backup that includes;
    40    (A)  the  creation  of  immutable  backups  of state entity-maintained
    41  personal information;
    42    (B) through data validation techniques, the exclusion of unwanted data
    43  from such immutable  backups,  including  but  not  limited  to  illegal
    44  content,  corrupted  data,  malicious  code,  and  content that breaches
    45  intellectual property protections;
    46    (C) prohibitions on the use  of  such  immutable  backups  except  for
    47  conducting  data  validation and performing information system recovery;
    48  and
    49    (D) storage of such immutable backups in segmented storage;
    50    (iii) information system recovery that includes creating an  identical
    51  copy of an immutable backup of state entity-maintained personal informa-
    52  tion  in  segmented  storage for use when an information system has been
    53  adversely affected by a  breach  of  the  security  of  the  system  and
    54  requires restoration from one or more backups;
    55    (iv)  data retention and deletion policies specifying how long certain
    56  types of data shall be retained on information systems and as  immutable

        S. 1961--A                          4
 
     1  backups  in  segmented storage and when or under what circumstances such
     2  data shall be deleted; and
     3    (v) annual workforce training regarding protection against breaches of
     4  the  security  of  the  system, as well as processes and procedures that
     5  should be followed in the event of a  breach  of  the  security  of  the
     6  system.
     7    (b)  Such  regulations  may  be adopted on an emergency basis. If such
     8  regulations are adopted on an emergency basis, the office  shall  engage
     9  in  the  formal  rulemaking  procedure no later than the day immediately
    10  following the date that the office promulgated such  regulations  on  an
    11  emergency basis. Provided that the office has commenced the formal rule-
    12  making  process,  the  regulations  adopted on an emergency basis may be
    13  renewed no more than two times.
    14    3. Vulnerability assessments. Notwithstanding any provision of law  to
    15  the contrary, each state entity shall engage in vulnerability testing of
    16  its information systems as follows:
    17    (a) Beginning January first, two thousand twenty-seven and on a month-
    18  ly  basis  thereafter,  each  state entity shall perform, or cause to be
    19  performed, a vulnerability assessment of at least one  mission  critical
    20  information system ensuring that each mission critical system has under-
    21  gone a vulnerability assessment during the past year. A report detailing
    22  the  vulnerability  assessment  methodology  and  findings shall be made
    23  available to the office for review no later than forty-five  days  after
    24  the testing has been completed.
    25    (b)  Beginning  December  first, two thousand twenty-seven, each state
    26  entity's entire information system shall undergo vulnerability  testing.
    27  A report detailing the vulnerability assessment methodology and findings
    28  shall  be  made  available to the office for review no later than forty-
    29  five days after such testing has been completed.
    30    (c) The office shall assist  state  entities  in  complying  with  the
    31  provisions of this section.
    32    4.  Data  and information system inventory. (a) No later than one year
    33  after the effective date of this section, each state entity shall create
    34  an inventory of the state entity-maintained personal information and the
    35  purpose or purposes for  which  such  state  entity-maintained  personal
    36  information  is maintained and used. The inventory shall include a list-
    37  ing of all types of state entity-maintained personal information,  along
    38  with the source and the median age of such information.
    39    (b)  No  later than one year after the effective date of this section,
    40  each state entity shall create an inventory of its  information  systems
    41  and  the  purpose  or purposes for which each such information system is
    42  maintained and used.   The  inventory  shall  denote  those  information
    43  systems  that  are mission critical and those that use personal informa-
    44  tion, and whether the information system is protected by immutable back-
    45  ups and stored in a segmented manner.
    46    (c) Notwithstanding paragraphs (a) and (b) of this subdivision,  if  a
    47  state  entity  has  already completed a state entity-maintained personal
    48  information inventory or information systems inventory, such state enti-
    49  ty  shall  update  the  previously  completed  state   entity-maintained
    50  personal  information inventory or information system inventory no later
    51  than one year after the effective date of this section.
    52    (d) Upon written request from the office, a state entity shall provide
    53  the office with either or both of the state  entity-maintained  personal
    54  information  and  information systems inventories required to be created
    55  or updated pursuant to this subdivision.

        S. 1961--A                          5
 
     1    (e) Notwithstanding paragraph (d) of this subdivision, the state enti-
     2  ty-maintained personal information and information  systems  inventories
     3  required  to be created or updated pursuant to this subdivision shall be
     4  kept confidential and shall not be  made  available  for  disclosure  or
     5  inspection  under the state freedom of information law unless a subpoena
     6  or other court order directs the office or state entity to release  such
     7  inventory or information from such inventory.
     8    5. Incident management and recovery. (a) No later than eighteen months
     9  after  the  effective date of this section, each state entity shall have
    10  created an incident response plan for incidents involving  a  breach  of
    11  the security of the system that render an information system or its data
    12  unavailable,  and  incidents  involving  a breach of the security of the
    13  system that result in the alteration  or  deletion  of  or  unauthorized
    14  access to, personal information.
    15    (b)  Such  incident  response plan shall include a procedure for situ-
    16  ations where information systems  have  been  adversely  affected  by  a
    17  breach  of  the  security  of the system, as well as a procedure for the
    18  storage  of  personal  information  and  mission  critical  backups   in
    19  segmented  storage  to ensure that such personal information and mission
    20  critical systems are protected by immutable backups.
    21    (c) Beginning January first, two thousand twenty-nine and on an annual
    22  basis thereafter, each state entity shall complete at least one exercise
    23  of its incident  response  plan  that  includes  copying  the  immutable
    24  personal   information   and  mission  critical  applications  from  the
    25  segmented portion of the state entity's  information  system  and  using
    26  such copies in the state entity's restoration and recovery process. Upon
    27  completion  of  such exercise, the state entity shall document the inci-
    28  dent response plan's successes and shortcomings in an incident  response
    29  plan  exercise report. Such incident response plan exercise report shall
    30  be kept confidential and shall not be made available for  disclosure  or
    31  inspection  under the state freedom of information law unless a subpoena
    32  or other court order directs the state entity to release such  inventory
    33  or information from such inventory.
    34    6. No private right of action. Nothing set forth in this section shall
    35  be construed as creating or establishing a private cause of action.
    36    §  4.  Severability. The provisions of this act shall be severable and
    37  if any portion thereof or the applicability thereof  to  any  person  or
    38  circumstances shall be held to be invalid, the remainder of this act and
    39  the application thereof shall not be affected thereby.
    40    § 5. This act shall take effect immediately.
Go to top