Investigation of cybersecurity events; records.

Checkout our iOS App for a better way to browser and research.

(A) If a licensee learns that a cybersecurity event has occurred or may have occurred, the licensee, an outside vendor, or service provider designated to act on behalf of the licensee must conduct a prompt investigation of the event.

(B) During the investigation, the licensee, outside vendor, or service provider designated to act on behalf of the licensee shall, at a minimum:

(1) determine whether a cybersecurity event occurred;

(2) assess the nature and scope of the cybersecurity event;

(3) identify nonpublic information that may have been involved in the cybersecurity event; and

(4) perform or oversee reasonable measures to restore the security of the information systems compromised in the cybersecurity event in order to prevent further unauthorized acquisition, release, or use of nonpublic information in the licensee's possession, custody, or control.

(C) If the licensee learns that a cybersecurity event has occurred or may have occurred in a system maintained by a third-party service provider, the licensee shall complete an investigation pursuant to the requirements of this section or confirm and document that the third-party service provider has completed an investigation pursuant to the requirements of this section.

(D) The licensee shall maintain records concerning all cybersecurity events for a period of at least five years from the date of the cybersecurity event and produce those records upon demand of the director.

HISTORY: 2018 Act No. 171 (H.4655), Section 3, eff January 1, 2019.

Editor's Note

2018 Act No. 171, Sections 1 and 2, provide as follows:

"SECTION 1. The purpose and intent of this act is to establish standards for data security and standards for the investigation of and notification to the director of a cybersecurity event applicable to licensees. This act may not be construed to create or imply a private cause of action for a violation of its provisions nor may it be construed to curtail a private cause of action which would otherwise exist in the absence of this act.

"SECTION 2. This act is known and may be cited as the 'South Carolina Insurance Data Security Act'."


Download our app to see the most-to-date content.