Skip to main content Skip to office menu Skip to footer
Capital IconMinnesota Legislature

HF 4348

1st Engrossment - 93rd Legislature (2023 - 2024) Posted on 03/20/2024 12:44pm

KEY: stricken = removed, old language.
underscored = added, new language.

Bill Text Versions

Engrossments
Introduction Posted on 02/27/2024
1st Engrossment Posted on 03/20/2024

Current Version - 1st Engrossment

Line numbers 1.1 1.2 1.3 1.4
1.5 1.6 1.7 1.8 1.9 1.10 1.11 1.12 1.13 1.14 1.15 1.16 1.17 1.18 1.19 1.20 1.21 2.1 2.2 2.3 2.4 2.5 2.6 2.7 2.8 2.9 2.10 2.11 2.12 2.13 2.14 2.15 2.16 2.17 2.18 2.19 2.20 2.21 2.22 2.23 2.24 2.25 2.26 2.27 2.28 2.29 2.30 3.1 3.2 3.3 3.4 3.5 3.6 3.7 3.8 3.9 3.10 3.11 3.12 3.13 3.14 3.15 3.16 3.17 3.18 3.19 3.20 3.21 3.22 3.23 3.24 3.25 3.26 3.27 3.28 3.29 3.30 3.31 4.1 4.2 4.3 4.4 4.5 4.6 4.7 4.8 4.9 4.10 4.11 4.12 4.13 4.14 4.15 4.16 4.17 4.18 4.19 4.20 4.21 4.22 4.23 4.24 4.25 4.26 4.27 4.28 4.29 4.30 4.31 4.32 4.33 5.1 5.2 5.3 5.4 5.5 5.6 5.7 5.8 5.9 5.10 5.11 5.12 5.13 5.14 5.15 5.16 5.17 5.18 5.19 5.20 5.21 5.22 5.23 5.24 5.25 5.26 5.27 5.28 5.29 5.30 5.31 6.1 6.2 6.3 6.4 6.5 6.6 6.7 6.8 6.9 6.10 6.11 6.12 6.13 6.14 6.15 6.16 6.17 6.18 6.19 6.20 6.21 6.22 6.23 6.24 6.25 6.26 6.27 6.28 6.29 6.30 6.31 7.1 7.2 7.3 7.4 7.5 7.6 7.7 7.8 7.9 7.10 7.11 7.12 7.13 7.14 7.15 7.16 7.17 7.18 7.19 7.20 7.21 7.22 7.23 7.24 7.25 7.26 7.27 7.28 7.29 7.30 7.31 7.32 8.1 8.2 8.3 8.4 8.5 8.6 8.7 8.8 8.9 8.10 8.11 8.12 8.13 8.14
8.15 8.16 8.17 8.18 8.19 8.20 8.21 8.22 8.23 8.24 8.25 8.26 8.27 8.28 8.29 8.30
9.1 9.2 9.3 9.4 9.5 9.6 9.7 9.8 9.9 9.10 9.11 9.12 9.13 9.14 9.15 9.16 9.17 9.18 9.19 9.20 9.21 9.22 9.23 9.24 9.25 9.26 9.27 9.28 9.29 9.30 9.31 10.1 10.2 10.3 10.4 10.5 10.6 10.7 10.8 10.9 10.10 10.11 10.12 10.13 10.14 10.15 10.16 10.17 10.18 10.19 10.20 10.21 10.22 10.23 10.24 10.25 10.26 10.27 10.28 10.29 10.30 10.31 11.1 11.2 11.3 11.4 11.5 11.6 11.7 11.8 11.9 11.10 11.11 11.12 11.13 11.14 11.15 11.16 11.17 11.18 11.19 11.20 11.21 11.22 11.23 11.24 11.25 11.26 11.27 11.28 11.29 11.30 11.31 11.32 12.1 12.2 12.3 12.4 12.5 12.6 12.7 12.8 12.9 12.10 12.11 12.12 12.13 12.14 12.15 12.16 12.17 12.18 12.19 12.20 12.21 12.22 12.23 12.24 12.25 12.26 12.27 12.28 12.29 12.30 12.31 12.32 13.1 13.2 13.3 13.4 13.5 13.6 13.7 13.8 13.9 13.10 13.11 13.12 13.13 13.14 13.15 13.16 13.17 13.18 13.19 13.20 13.21 13.22 13.23 13.24 13.25
13.26 13.27 13.28 13.29 13.30 13.31
14.1 14.2 14.3 14.4 14.5 14.6 14.7
14.8 14.9 14.10 14.11 14.12 14.13 14.14 14.15 14.16 14.17 14.18 14.19 14.20 14.21 14.22 14.23 14.24 14.25 14.26 14.27 14.28 14.29 14.30 14.31 15.1 15.2 15.3 15.4 15.5
15.6 15.7 15.8 15.9 15.10 15.11 15.12 15.13
15.14 15.15 15.16 15.17 15.18 15.19 15.20 15.21 15.22 15.23 15.24 15.25 15.26 15.27 15.28 15.29 15.30 15.31 15.32 16.1 16.2 16.3 16.4 16.5 16.6 16.7 16.8 16.9 16.10 16.11 16.12 16.13 16.14 16.15 16.16 16.17 16.18 16.19 16.20 16.21 16.22 16.23 16.24 16.25 16.26 16.27 16.28 16.29 16.30 16.31 16.32 16.33 17.1 17.2

A bill for an act
relating to financial institutions; establishing a nonbank data security law; proposing
coding for new law as Minnesota Statutes, chapter 46A.

BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF MINNESOTA:

Section 1.

new text begin [46A.01] DEFINITIONS.
new text end

new text begin Subdivision 1. new text end

new text begin Terms. new text end

new text begin For the purposes of this chapter, the terms defined in this section
have the meanings given them.
new text end

new text begin Subd. 2. new text end

new text begin Authorized user. new text end

new text begin "Authorized user" means any employee, contractor, agent,
or other person who: (1) participates in a financial institution's business operations; and (2)
is authorized to access and use any of the financial institution's information systems and
data.
new text end

new text begin Subd. 3. new text end

new text begin Commissioner. new text end

new text begin "Commissioner" means the commissioner of commerce.
new text end

new text begin Subd. 4. new text end

new text begin Consumer. new text end

new text begin (a) "Consumer" means an individual who obtains or has obtained
from a financial institution a financial product or service that is used primarily for personal,
family, or household purposes, or is used by the individual's legal representative. Consumer
includes but is not limited to an individual who:
new text end

new text begin (1) applies to a financial institution for credit for personal, family, or household purposes,
regardless of whether the credit is extended;
new text end

new text begin (2) provides nonpublic personal information to a financial institution in order to obtain
a determination whether the individual qualifies for a loan used primarily for personal,
family, or household purposes, regardless of whether the loan is extended;
new text end

new text begin (3) provides nonpublic personal information to a financial institution in connection with
obtaining or seeking to obtain financial, investment, or economic advisory services, regardless
of whether the financial institution establishes a continuing advisory relationship with the
individual; or
new text end

new text begin (4) has a loan for personal, family, or household purposes in which the financial institution
has ownership or servicing rights, even if the financial institution or one or more other
institutions that hold ownership or servicing rights in conjunction with the financial institution
hires an agent to collect on the loan.
new text end

new text begin (b) Consumer does not include an individual who:
new text end

new text begin (1) is a consumer of another financial institution that uses a different financial institution
to act solely as an agent for, or provide processing or other services to, the consumer's
financial institution;
new text end

new text begin (2) designates a financial institution solely for the purposes to act as a trustee for a trust;
new text end

new text begin (3) is the beneficiary of a trust for which the financial institution serves as trustee; or
new text end

new text begin (4) is a participant or a beneficiary of an employee benefit plan that the financial
institution sponsors or for which the financial institution acts as a trustee or fiduciary.
new text end

new text begin Subd. 5. new text end

new text begin Continuing relationship. new text end

new text begin (a) "Continuing relationship" means a consumer:
new text end

new text begin (1) has a credit or investment account with a financial institution;
new text end

new text begin (2) obtains a loan from a financial institution;
new text end

new text begin (3) purchases an insurance product from a financial institution;
new text end

new text begin (4) holds an investment product through a financial institution, including but not limited
to when the financial institution acts as a custodian for securities or for assets in an individual
retirement arrangement;
new text end

new text begin (5) enters into an agreement or understanding with a financial institution whereby the
financial institution undertakes to arrange or broker a home mortgage loan, or credit to
purchase a vehicle, for the consumer;
new text end

new text begin (6) enters into a lease of personal property on a nonoperating basis with a financial
institution;
new text end

new text begin (7) obtains financial, investment, or economic advisory services from a financial
institution for a fee;
new text end

new text begin (8) becomes a financial institution's client to obtain tax preparation or credit counseling
services from the financial institution;
new text end

new text begin (9) obtains career counseling while: (i) seeking employment with a financial institution
or the finance, accounting, or audit department of any company; or (ii) employed by a
financial institution or department of any company;
new text end

new text begin (10) is obligated on an account that a financial institution purchases from another financial
institution, regardless of whether the account is in default when purchased, unless the
financial institution does not locate the consumer or attempt to collect any amount from the
consumer on the account;
new text end

new text begin (11) obtains real estate settlement services from a financial institution; or
new text end

new text begin (12) has a loan for which a financial institution owns the servicing rights.
new text end

new text begin (b) Continuing relationship does not include situations where:
new text end

new text begin (1) the consumer obtains a financial product or service from a financial institution only
in isolated transactions, including but not limited to: (i) using a financial institution's
automated teller machine to withdraw cash from an account at another financial institution;
(ii) purchasing a money order from a financial institution; (iii) cashing a check with a
financial institution; or (iv) making a wire transfer through a financial institution;
new text end

new text begin (2) a financial institution sells the consumer's loan and does not retain the rights to service
the loan;
new text end

new text begin (3) a financial institution sells the consumer airline tickets, travel insurance, or traveler's
checks in isolated transactions;
new text end

new text begin (4) the consumer obtains onetime personal or real property appraisal services from a
financial institution; or
new text end

new text begin (5) the consumer purchases checks for a personal checking account from a financial
institution.
new text end

new text begin Subd. 6. new text end

new text begin Customer. new text end

new text begin "Customer" means a consumer who has a customer relationship
with a financial institution.
new text end

new text begin Subd. 7. new text end

new text begin Customer information. new text end

new text begin "Customer information" means any record containing
nonpublic personal information about a financial institution's customer, whether the record
is in paper, electronic, or another form, that is handled or maintained by or on behalf of the
financial institution or the financial institution's affiliates.
new text end

new text begin Subd. 8. new text end

new text begin Customer relationship. new text end

new text begin "Customer relationship" means a continuing relationship
between a consumer and a financial institution under which the financial institution provides
to the consumer one or more financial products or services that are used primarily for
personal, family, or household purposes.
new text end

new text begin Subd. 9. new text end

new text begin Encryption. new text end

new text begin "Encryption" means the transformation of data into a format that
results in a low probability of assigning meaning without the use of a protective process or
key, consistent with current cryptographic standards and accompanied by appropriate
safeguards for cryptographic key material.
new text end

new text begin Subd. 10. new text end

new text begin Federally insured depository financial institution. new text end

new text begin "Federally insured
depository financial institution" means a bank, credit union, savings and loan association,
trust company, savings association, savings bank, industrial bank, or industrial loan company
organized under the laws of the United States or any state of the United States, when the
bank, credit union, savings and loan association, trust company, savings association, savings
bank, industrial bank, or industrial loan company has federally insured deposits.
new text end

new text begin Subd. 11. new text end

new text begin Financial product or service. new text end

new text begin "Financial product or service" means any
product or service that a financial holding company could offer by engaging in a financial
activity under section 4(k) of the Bank Holding Company Act of 1956, United States Code,
title 12, section 1843(k). Financial product or service includes a financial institution's
evaluation or brokerage of information that the financial institution collects in connection
with a request or an application from a consumer for a financial product or service.
new text end

new text begin Subd. 12. new text end

new text begin Financial institution. new text end

new text begin "Financial institution" means a consumer small loan
lender under section 47.60, a person owning or maintaining electronic financial terminals
under section 47.62, a trust company under chapter 48A, a loan and thrift company under
chapter 53, a currency exchange under chapter 53A, a money transmitter under chapter 53B,
a sales finance company under chapter 53C, a regulated loan lender under chapter 56, a
residential mortgage originator or servicer under chapter 58, a student loan servicer under
chapter 58B, a credit service organization under section 332.54, a debt management service
provider or person providing debt management services under chapter 332A, or a debt
settlement service provider or person providing debt settlement services under chapter 332B.
new text end

new text begin Subd. 13. new text end

new text begin Information security program. new text end

new text begin "Information security program" means the
administrative, technical, or physical safeguards a financial institution uses to access, collect,
distribute, process, protect, store, use, transmit, dispose of, or otherwise handle customer
information.
new text end

new text begin Subd. 14. new text end

new text begin Information system. new text end

new text begin "Information system" means a discrete set of electronic
information resources organized to collect, process, maintain, use, share, disseminate, or
dispose of electronic information, as well as any specialized system, including but not
limited to industrial process controls systems, telephone switching and private branch
exchange systems, and environmental controls systems, that contains customer information
or that is connected to a system that contains customer information.
new text end

new text begin Subd. 15. new text end

new text begin Multifactor authentication. new text end

new text begin "Multifactor authentication" means authentication
through verification of at least two of the following factors:
new text end

new text begin (1) knowledge factors, including but not limited to a password;
new text end

new text begin (2) possession factors, including but not limited to a token; or
new text end

new text begin (3) inherence factors, including but not limited to biometric characteristics.
new text end

new text begin Subd. 16. new text end

new text begin Nonpublic personal information. new text end

new text begin (a) "Nonpublic personal information"
means:
new text end

new text begin (1) personally identifiable financial information; or
new text end

new text begin (2) any list, description, or other grouping of consumers, including publicly available
information pertaining to the list, description, or other grouping of consumers, that is derived
using personally identifiable financial information that is not publicly available.
new text end

new text begin (b) Nonpublic personal information includes but is not limited to any list of individuals'
names and street addresses that is derived in whole or in part using personally identifiable
financial information that is not publicly available, including account numbers.
new text end

new text begin (c) Nonpublic personal information does not include:
new text end

new text begin (1) publicly available information, except as included on a list described in paragraph
(a), clause (2);
new text end

new text begin (2) any list, description, or other grouping of consumers, including publicly available
information pertaining to the list, description, or other grouping of consumers, that is derived
without using any personally identifiable financial information that is not publicly available;
or
new text end

new text begin (3) any list of individuals' names and addresses that contains only publicly available
information, is not derived in whole or in part using personally identifiable financial
information that is not publicly available, and is not disclosed in a manner that indicates
that any individual on the list is the financial institution's consumer.
new text end

new text begin Subd. 17. new text end

new text begin Notification event. new text end

new text begin "Notification event" means the acquisition of unencrypted
customer information without the authorization of the individual to which the information
pertains. Customer information is considered unencrypted for this purpose if the encryption
key was accessed by an unauthorized person. Unauthorized acquisition is presumed to
include unauthorized access to unencrypted customer information unless the financial
institution has reliable evidence showing that there has not been, or could not reasonably
have been, unauthorized acquisition of customer information.
new text end

new text begin Subd. 18. new text end

new text begin Penetration testing. new text end

new text begin "Penetration testing" means a test methodology in which
assessors attempt to circumvent or defeat the security features of an information system by
attempting to penetrate databases or controls from outside or inside a financial institution's
information systems.
new text end

new text begin Subd. 19. new text end

new text begin Personally identifiable financial information. new text end

new text begin (a) "Personally identifiable
financial information" means any information:
new text end

new text begin (1) a consumer provides to a financial institution to obtain a financial product or service;
new text end

new text begin (2) about a consumer resulting from any transaction involving a financial product or
service between a financial institution and a consumer; or
new text end

new text begin (3) a financial institution otherwise obtains about a consumer in connection with providing
a financial product or service to the customer.
new text end

new text begin (b) Personally identifiable financial information includes:
new text end

new text begin (1) information a consumer provides to a financial institution on an application to obtain
a loan, credit card, or other financial product or service;
new text end

new text begin (2) account balance information, payment history, overdraft history, and credit or debit
card purchase information;
new text end

new text begin (3) the fact that an individual is or has been a financial institution's customer or has
obtained a financial product or service from the financial institution;
new text end

new text begin (4) any information about a financial institution's consumer, if the information is disclosed
in a manner that indicates that the individual is or has been the financial institution's
consumer;
new text end

new text begin (5) any information that a consumer provides to a financial institution or that a financial
institution or a financial institution's agent otherwise obtains in connection with collecting
on or servicing a credit account;
new text end

new text begin (6) any information a financial institution collects through an Internet information
collecting device from a web server; and
new text end

new text begin (7) information from a consumer report.
new text end

new text begin (c) Personally identifiable financial information does not include:
new text end

new text begin (1) a list of customer names and addresses for an entity that is not a financial institution;
and
new text end

new text begin (2) information that does not identify a consumer, including but not limited to aggregate
information or blind data that does not contain personal identifiers, including account
numbers, names, or addresses.
new text end

new text begin Subd. 20. new text end

new text begin Publicly available information. new text end

new text begin (a) "Publicly available information" means
any information that a financial institution has a reasonable basis to believe is lawfully made
available to the general public from:
new text end

new text begin (1) federal, state, or local government records;
new text end

new text begin (2) widely distributed media; or
new text end

new text begin (3) disclosures to the general public that are required under federal, state, or local law.
new text end

new text begin (b) Publicly available information includes but is not limited to:
new text end

new text begin (1) with respect to government records, information in government real estate records
and security interest filings; and
new text end

new text begin (2) with respect to widely distributed media, information from a telephone book, a
television or radio program, a newspaper, or a website that is available to the general public
on an unrestricted basis. A website is not restricted merely because an Internet service
provider or a site operator requires a fee or a password, provided that access is available to
the general public.
new text end

new text begin (c) For purposes of this subdivision, a financial institution has a reasonable basis to
believe that information is lawfully made available to the general public if the financial
institution has taken steps to determine: (1) that the information is of the type that is available
to the general public; and (2) whether an individual can direct that the information not be
made available to the general public and, if so, that the financial institution's consumer has
not directed that the information not be made available to the general public. A financial
institution has a reasonable basis to believe that mortgage information is lawfully made
available to the general public if the financial institution determines the information is of
the type included on the public record in the jurisdiction where the mortgage would be
recorded. A financial institution has a reasonable basis to believe that an individual's
telephone number is lawfully made available to the general public if the financial institution
has located the telephone number in the telephone book or the consumer has informed the
financial institution that the telephone number is not unlisted.
new text end

new text begin Subd. 21. new text end

new text begin Qualified individual. new text end

new text begin "Qualified individual" means the individual designated
by a financial institution to oversee, implement, and enforce the financial institution's
information security program.
new text end

new text begin Subd. 22. new text end

new text begin Security event. new text end

new text begin "Security event" means an event resulting in unauthorized
access to, or disruption or misuse of: (1) an information system or information stored on an
information system; or (2) customer information held in physical form.
new text end

new text begin Subd. 23. new text end

new text begin Service provider. new text end

new text begin "Service provider" means any person or entity that receives,
maintains, processes, or otherwise is permitted access to customer information through the
service provider's provision of services directly to a financial institution that is subject to
this chapter.
new text end

Sec. 2.

new text begin [46A.02] SAFEGUARDING CUSTOMER INFORMATION; STANDARDS.
new text end

new text begin Subdivision 1. new text end

new text begin Information security program. new text end

new text begin (a) A financial institution must develop,
implement, and maintain a comprehensive information security program.
new text end

new text begin (b) The information security program must: (1) be written in one or more readily
accessible parts; and (2) contain administrative, technical, and physical safeguards that are
appropriate to the financial institution's size and complexity, the nature and scope of the
financial institution's activities, and the sensitivity of any customer information at issue.
new text end

new text begin (c) The information security program must include the elements set forth in section
46A.03 and must be reasonably designed to achieve the objectives of this chapter, as
established under subdivision 2.
new text end

new text begin Subd. 2. new text end

new text begin Objectives. new text end

new text begin The objectives of this chapter are to:
new text end

new text begin (1) ensure the security and confidentiality of customer information;
new text end

new text begin (2) protect against any anticipated threats or hazards to the security or integrity of
customer information; and
new text end

new text begin (3) protect against unauthorized access to or use of customer information that might
result in substantial harm or inconvenience to a customer.
new text end

Sec. 3.

new text begin [46A.03] ELEMENTS.
new text end

new text begin Subdivision 1. new text end

new text begin Generally. new text end

new text begin In order to develop, implement, and maintain an information
security program, a financial institution must comply with this section.
new text end

new text begin Subd. 2. new text end

new text begin Qualified individual. new text end

new text begin (a) A financial institution must designate a qualified
individual responsible for overseeing, implementing, and enforcing the financial institution's
information security program. The qualified individual may be employed by the financial
institution, an affiliate, or a service provider.
new text end

new text begin (b) If a financial institution designates an individual employed by an affiliate or service
provider as the financial institution's qualified individual, the financial institution must:
new text end

new text begin (1) retain responsibility for complying with this chapter;
new text end

new text begin (2) designate a senior member of the financial institution's personnel to be responsible
for directing and overseeing the qualified individual's activities; and
new text end

new text begin (3) require the service provider or affiliate to maintain an information security program
that protects the financial institution in a manner that complies with the requirements of
this chapter.
new text end

new text begin Subd. 3. new text end

new text begin Security risk assessment. new text end

new text begin (a) A financial institution must base the financial
institution's information security program on a risk assessment that:
new text end

new text begin (1) identifies reasonably foreseeable internal and external risks to the security,
confidentiality, and integrity of customer information that might result in the unauthorized
disclosure, misuse, alteration, destruction, or other compromise of customer information;
and
new text end

new text begin (2) assesses the sufficiency of any safeguards in place to control the risks identified
under clause (1).
new text end

new text begin (b) The risk assessment must be made in writing and must include:
new text end

new text begin (1) criteria to evaluate and categorize identified security risks or threats the financial
institution faces;
new text end

new text begin (2) criteria to assess the confidentiality, integrity, and availability of the financial
institution's information systems and customer information, including the adequacy of
existing controls in the context of the identified risks or threats the financial institution
faces; and
new text end

new text begin (3) requirements describing how:
new text end

new text begin (i) identified risks are mitigated or accepted based on the risk assessment; and
new text end

new text begin (ii) the information security program addresses the risks.
new text end

new text begin (c) A financial institution must periodically perform additional risk assessments that:
new text end

new text begin (1) reexamine the reasonably foreseeable internal and external risks to the security,
confidentiality, and integrity of customer information that might result in the unauthorized
disclosure, misuse, alteration, destruction, or other compromise of customer information;
and
new text end

new text begin (2) reassess the sufficiency of any safeguards in place to control the risks identified
under clause (1).
new text end

new text begin Subd. 4. new text end

new text begin Risk control. new text end

new text begin A financial institution must design and implement safeguards to
control the risks the financial institution identifies through the risk assessment under
subdivision 3, including by:
new text end

new text begin (1) implementing and periodically reviewing access controls, including technical and,
as appropriate, physical controls to:
new text end

new text begin (i) authenticate and permit access only to authorized users to protect against the
unauthorized acquisition of customer information; and
new text end

new text begin (ii) limit an authorized user's access to only customer information that the authorized
user needs to perform the authorized user's duties and functions or, in the case of a customer,
to limit access to the customer's own information;
new text end

new text begin (2) identifying and managing the data, personnel, devices, systems, and facilities that
enable the financial institution to achieve business purposes in accordance with the business
purpose's relative importance to business objectives and the financial institution's risk
strategy;
new text end

new text begin (3) protecting by encryption all customer information held or transmitted by the financial
institution both in transit over external networks and at rest. To the extent a financial
institution determines that encryption of customer information either in transit over external
networks or at rest is infeasible, the financial institution may secure the customer information
using effective alternative compensating controls that have been reviewed and approved by
the financial institution's qualified individual;
new text end

new text begin (4) adopting: (i) secure development practices for in-house developed applications
utilized by the financial institution to transmit, access, or store customer information; and
(ii) procedures to evaluate, assess, or test the security of externally developed applications
the financial institution uses to transmit, access, or store customer information;
new text end

new text begin (5) implementing multifactor authentication for any individual that accesses any
information system, unless the financial institution's qualified individual has approved in
writing the use of a reasonably equivalent or more secure access control;
new text end

new text begin (6) developing, implementing, and maintaining procedures to securely dispose of
customer information in any format no later than two years after the last date the information
is used in connection with providing a product or service to the customer which relates,
unless the information is necessary for business operations or for other legitimate business
purposes, is otherwise required to be retained by law or regulation, or if targeted disposal
is not reasonably feasible due to the manner in which the information is maintained;
new text end

new text begin (7) periodically reviewing the financial institution's data retention policy to minimize
the unnecessary retention of data;
new text end

new text begin (8) adopting procedures for change management; and
new text end

new text begin (9) implementing policies, procedures, and controls designed to: (i) monitor and log the
activity of authorized users; and (ii) detect unauthorized access to, use of, or tampering with
customer information by authorized users.
new text end

new text begin Subd. 5. new text end

new text begin Testing and monitoring. new text end

new text begin (a) A financial institution must regularly test or
otherwise monitor the effectiveness of the safeguards' key controls, systems, and procedures,
including the controls, systems, and procedures that detect actual and attempted attacks on,
or intrusions into, information systems.
new text end

new text begin (b) For information systems, monitoring and testing must include continuous monitoring
or periodic penetration testing and vulnerability assessments. Absent effective continuous
monitoring or other systems to detect on an ongoing basis any changes in information
systems that may create vulnerabilities, a financial institution must conduct:
new text end

new text begin (1) annual penetration testing of the financial institution's information systems, based
on relevant identified risks in accordance with the risk assessment; and
new text end

new text begin (2) vulnerability assessments, including systemic scans or information systems reviews
that are reasonably designed to identify publicly known security vulnerabilities in the
financial institution's information systems based on the risk assessment, at least every six
months, whenever a material change to the financial institution's operations or business
arrangements occurs, and whenever the financial institution knows or has reason to know
circumstances exist that may have a material impact on the financial institution's information
security program.
new text end

new text begin Subd. 6. new text end

new text begin Internal policies and procedures. new text end

new text begin A financial institution must implement
policies and procedures to ensure that the financial institution's personnel are able to enact
the financial institution's information security program by:
new text end

new text begin (1) providing the financial institution's personnel with security awareness training that
is updated as necessary to reflect risks identified by the risk assessment;
new text end

new text begin (2) utilizing qualified information security personnel employed by the financial institution,
an affiliate, or a service provider sufficient to manage the financial institution's information
security risks and to perform or oversee the information security program;
new text end

new text begin (3) providing information security personnel with security updates and training sufficient
to address relevant security risks; and
new text end

new text begin (4) verifying that key information security personnel take steps to maintain current
knowledge of changing information security threats and countermeasures.
new text end

new text begin Subd. 7. new text end

new text begin Provider oversight. new text end

new text begin A financial institution must oversee service providers by:
new text end

new text begin (1) taking reasonable steps to select and retain service providers that are capable of
maintaining appropriate safeguards for the customer information at issue;
new text end

new text begin (2) requiring by contract the financial institution's service providers to implement and
maintain appropriate safeguards; and
new text end

new text begin (3) periodically assessing the financial institution's service providers based on the risk
the service providers present and the continued adequacy of the service providers' safeguards.
new text end

new text begin Subd. 8. new text end

new text begin Information security program; evaluation; adjustment. new text end

new text begin A financial institution
must evaluate and adjust the financial institution's information security program to reflect:
(1) the results of the testing and monitoring required under subdivision 5; (2) any material
changes to the financial institution's operations or business arrangements; (3) the results of
risk assessments performed under subdivision 3, paragraph (c); or (4) any other circumstances
that the financial institution knows or has reason to know may have a material impact on
the financial institution's information security program.
new text end

new text begin Subd. 9. new text end

new text begin Incident response plan. new text end

new text begin A financial institution must establish a written incident
response plan designed to promptly respond to and recover from any security event materially
affecting the confidentiality, integrity, or availability of customer information the financial
institution controls. An incident response plan must address:
new text end

new text begin (1) the goals of the incident response plan;
new text end

new text begin (2) the internal processes to respond to a security event;
new text end

new text begin (3) clear roles, responsibilities, and levels of decision making authority;
new text end

new text begin (4) external and internal communications and information sharing;
new text end

new text begin (5) requirements to remediate any identified weaknesses in information systems and
associated controls;
new text end

new text begin (6) documentation and reporting regarding security events and related incident response
activities; and
new text end

new text begin (7) evaluation and revision of the incident response plan as necessary after a security
event.
new text end

new text begin Subd. 10. new text end

new text begin Annual report. new text end

new text begin (a) A financial institution must require the financial institution's
qualified individual to report at least annually in writing to the financial institution's board
of directors or equivalent governing body. If a board of directors or equivalent governing
body does not exist, the report under this subdivision must be timely presented to a senior
officer responsible for the financial institution's information security program.
new text end

new text begin (b) The report made under this subdivision must include the following information:
new text end

new text begin (1) the overall status of the financial institution's information security program, including
compliance with this chapter and associated administrative rules; and
new text end

new text begin (2) material matters related to the financial institution's information security program,
including but not limited to addressing issues pertaining to: (i) the risk assessment; (ii) risk
management and control decisions; (iii) service provider arrangements; (iv) testing results;
(v) security events or violations and management's responses to the security event or
violation; and (vi) recommendations for changes in the information security program.
new text end

new text begin Subd. 11. new text end

new text begin Business continuity; disaster recovery. new text end

new text begin A financial institution must establish
a written plan addressing business continuity and disaster recovery.
new text end

Sec. 4.

new text begin [46A.04] EXCEPTIONS AND EXEMPTIONS.
new text end

new text begin (a) The requirements under section 46A.03, subdivisions 3; 5, paragraph (a); 9; and 10,
do not apply to financial institutions that maintain customer information concerning fewer
than five thousand consumers.
new text end

new text begin (b) This chapter does not apply to credit unions or federally insured depository
institutions.
new text end

Sec. 5.

new text begin [46A.05] ALTERATION OF FEDERAL REGULATION.
new text end

new text begin (a) If an amendment to Code of Federal Regulations, title 16, part 314, results in a
complete lack of federal regulations in the area, the version of the state requirements in
effect at the time of the amendment remain in effect for two years from the date the
amendment becomes effective.
new text end

new text begin (b) During the time period under paragraph (a), the department must adopt replacement
administrative rules as necessary and appropriate.
new text end

Sec. 6.

new text begin [46A.06] NOTIFICATION EVENT.
new text end

new text begin Subdivision 1. new text end

new text begin Notification requirement. new text end

new text begin (a) Upon discovering a notification event as
described in subdivision 2, if the notification event involves the information of at least 500
consumers, a financial institution must notify the commissioner as soon as possible, but no
later than 30 days after the date the event is discovered. The notice must be made (1) in a
format specified by the commissioner, and (2) electronically on a form located on the
department's website.
new text end

new text begin (b) The notice must include:
new text end

new text begin (1) the name and contact information of the reporting financial institution;
new text end

new text begin (2) a description of the types of information involved in the notification event;
new text end

new text begin (3) if possible to determine, the date or date range of the notification event;
new text end

new text begin (4) the number of consumers affected or potentially affected by the notification event;
new text end

new text begin (5) a general description of the notification event; and
new text end

new text begin (6) a statement (i) disclosing whether a law enforcement official has provided the financial
institution with a written determination indicating that providing notice to the public regarding
the breach would impede a criminal investigation or cause damage to national security, and
(ii) if a written determination described under item (i) was provided to the financial
institution, providing contact information that enables the commissioner to contact the law
enforcement official. A law enforcement official may request an initial delay of up to 30
days following the date that notice was provided to the commissioner. The delay may be
extended for an additional period of up to 60 days if the law enforcement official seeks an
extension in writing. An additional delay may be permitted only if the commissioner
determines that public disclosure of a security event continues to impede a criminal
investigation or cause damage to national security.
new text end

new text begin Subd. 2. new text end

new text begin Notification event treated as discovered. new text end

new text begin A notification event must be treated
as discovered on the first day when the event is known to a financial institution. A financial
institution is deemed to have knowledge of a notification event if the event is known to any
person, other than the person committing the breach, who is the financial institution's
employee, officer, or other agent.
new text end

Sec. 7.

new text begin [46A.07] COMMISSIONER'S POWERS.
new text end

new text begin (a) The commissioner has the power to examine and investigate the affairs of any covered
financial institution to determine whether the financial institution has been or is engaged in
any conduct that violates this chapter. This power is in addition to the powers granted to
the commissioner under section 46.01.
new text end

new text begin (b) If the commissioner has reason to believe that a financial institution has been or is
engaged in conduct in Minnesota that violates this chapter, the commissioner may take
action necessary or appropriate to enforce this chapter.
new text end

Sec. 8.

new text begin [46A.08] CONFIDENTIALITY.
new text end

new text begin Subdivision 1. new text end

new text begin Financial institution information. new text end

new text begin (a) Any documents, materials, or
other information in the control or possession of the department that are furnished by a
licensee or a licensee's employee or agent acting on behalf of a financial institution pursuant
to section 46A.06 or that are obtained by the commissioner in an investigation or examination
pursuant to section 46A.07: (1) are classified as confidential, protected nonpublic, or both;
(2) are not subject to subpoena; and (3) are not subject to discovery or admissible in evidence
in any private civil action.
new text end

new text begin (b) Notwithstanding paragraph (a), clauses (1) to (3), the commissioner is authorized to
use the documents, materials, or other information in the furtherance of any regulatory or
legal action brought as a part of the commissioner's duties.
new text end

new text begin Subd. 2. new text end

new text begin Certain testimony prohibited. new text end

new text begin Neither the commissioner nor any person who
received documents, materials, or other information while acting under the authority of the
commissioner is permitted or required to testify in a private civil action concerning
confidential documents, materials, or information subject to subdivision 1.
new text end

new text begin Subd. 3. new text end

new text begin Information sharing. new text end

new text begin In order to assist in the performance of the commissioner's
duties under sections 46A.01 to 46A.08, the commissioner may:
new text end

new text begin (1) share documents, materials, or other information, including the confidential and
privileged documents, materials, or information subject to subdivision 1, with other state,
federal, and international regulatory agencies, with the Conference of State Bank Supervisors,
the Conference of State Bank Supervisors' affiliates or subsidiaries, and with state, federal,
and international law enforcement authorities, provided that the recipient agrees in writing
to maintain the confidentiality and privileged status of the document, material, or other
information;
new text end

new text begin (2) receive documents, materials, or information, including otherwise confidential and
privileged documents, materials, or information, from the Conference of State Bank
Supervisors, the Conference of State Bank Supervisors' affiliates or subsidiaries, and from
regulatory and law enforcement officials of other foreign or domestic jurisdictions, and
must maintain as confidential or privileged any document, material, or information received
with notice or the understanding that the document, material, or information is confidential
or privileged under the laws of the jurisdiction that is the source of the document, material,
or information;
new text end

new text begin (3) share documents, materials, or other information subject to subdivision 1 with a
third-party consultant or vendor, provided the consultant agrees in writing to maintain the
confidentiality and privileged status of the document, material, or other information; and
new text end

new text begin (4) enter into agreements governing the sharing and use of information that are consistent
with this subdivision.
new text end

new text begin Subd. 4. new text end

new text begin No waiver of privilege or confidentiality; information retention. new text end

new text begin (a) The
disclosure of documents, materials, or information to the commissioner under this section
or as a result of sharing as authorized in subdivision 3 does not result in a waiver of any
applicable privilege or claim of confidentiality in the documents, materials, or information.
new text end

new text begin (b) A document, material, or information disclosed to the commissioner under this section
about a cybersecurity event must be retained and preserved by the financial institution for
five years.
new text end

new text begin Subd. 5. new text end

new text begin Certain actions public. new text end

new text begin Nothing in sections 46A.01 to 46A.08 prohibits the
commissioner from releasing final, adjudicated actions that are open to public inspection
pursuant to chapter 13 to a database or other clearinghouse service maintained by the
Conference of State Bank Supervisors, the Conference of State Bank Supervisors' affiliates,
or the Conference of State Bank Supervisors' subsidiaries.
new text end

new text begin Subd. 6. new text end

new text begin Classification, protection, and use of information by others. new text end

new text begin Documents,
materials, or other information in the possession or control of the Conference of State Bank
Supervisors or a third-party consultant pursuant to sections 46A.01 to 46A.08: (1) are
classified as confidential, protected nonpublic, and privileged; (2) are not subject to subpoena;
and (3) are not subject to discovery or admissible in evidence in a private civil action.
new text end