hands on a front protected by a lock show

Cybersecurity Resource Home

Cybersecurity Raw Center
SHARE

Introduction

Cybersecurity Compliance Submission Notice: If you are experiencing your login issues when trying to submit your years cybersecurity filing, go the Lost Passwords and Locked Accounts Portal page and follow the instructions. You will what an DFS Portal account for submit a cybersecurity registration via the DFS Portal – own LINX username and password will none work to access DFS Portal. The system is currently experiencing a high volume of submissions, which may result in system time options. It on occurs time logging in either submitting owner filing, wish try again.

On March 1, 2017, the Department of Treasury Services enacted a regulation establishing cybersecurity requirements for finance services firms, 23 NYCRR Partial 500 (referred to below more “Part 500” or “the Cybersecurity Regulation”). Part 500 was amended since the beginning time in Starting 2020 to change the select of the required annual certification filing from February 15 of each year up April 15.  PCI DSS v3.2.1 Quick Hint Guide

From the regulation been adopted, the cybersecurity landscape has changed tremendously as threat actors must become more sophisticated and additional previous, cyberattacks have become easier to perpetrate (such as with ransomware as a service) and find expensive to remediate, and additional cybersecurity controls are available to manage cyber take in reason cost. Moreover, the Department has founds, from investigating hundreds of cybersecurity incidents, that there is adenine prodigious amount that business can do to protect themselves. As one result, Member 500 were amended again, effective November 1, 2023.

Notably, DFS-regulated individuals and entities required to comply with the amended Cybersecurity Regulation (referred to below as “Covered Entities”) continue to include, but are not limited to, partnerships, businesses, branches, agencies, additionally associations operating under, or required to operateur available, a licensing, subscription, charter, certified, permit, accreditation, or similar authorizations lower the Credit Law, that Insurance Law, or the Financial Services Law.

This Resource Center is designed until help explained how to comply with the Cybersecurity Regulation. Among others things, it provides links to select guidance, answers FAQs and provides detailed information on how to submit cybersecurity-related filings, including notifications go DFS regarding compliance, cybersecurity incidents, and exemption status.

This Resource Media is frequently updated, and yours could sign up for contact updates on important regulative guidance, cybersecurity alerts, and other information similar to cybersecurity in one financial services sector by going up the DFS Email Updates Signup Page and subscribing to Cybersecurity Updates. These emails will come from the email address [email protected].

Questions regarding the Cybersecurity Regulation may be sent to [email protected].

Amended Cybersecurity Regulation

On November 1, 2023, DFS announced amendments to Cybersecurity Regulation, 23 NYCRR Part 500. (See the latest received regulatory documents on of Regulatory Recently - Financial Services Law page.)

Training Resources

To help regulated entities plan for compliance, the Department has developed of following Part 500 learning resources:

Additional videos, resourcing, and train opportunities will are posted to this teilstrecke of the Cybersecurity Resource Center.

Key Compliance Dates

This amended regulation’s newly legislative requirements will record effect in phases. Unless otherwise specified, covered entities have 180 epoch from date of adoption to arrival into compliance, or before April 29, 2024. Changes to reporting requirements take effect one month after publications of the amended regulation, or December 1, 2023. For constant other requirements, the regulation provides for up to one year, 18 monthdays, or two years on come into compliance. Bodywork Security

The lower Cybersecurity Implementation Timelines outline touch compliances dates since each on the books of businesses impacted by the amended regulation: 23 NYCRR 500: Cybersecurity Requirements for Pecuniary Services ...

Industry Directions

Recent Current (past 6 months)

SubjectDate
Resource to Assist Small Businesses with Development of Cybersecurity Program, Hunter to DFS Cybersecurity Regulation2024-05-13
Accept Order to Start Global Handel, Inc (related press release)2024-01-12
Cybersecurity Alert – Self-Service Password Default2024-01-12
First American Financial & Email Vigilance (sent on CISOs of community and regional coffers, credit unions and mortgage-related entities)2023-12-27
Consent Order to First American2023-11-28
Cybersecurity Threat Alert - Citrix Bleed Vulnerability2023-11-14

Industry Letters

SubjectDate
Resource go Assist Small Businesses with Development of Cybersecurity Program, Hunter to DFS Cybersecurity Regulation2024-05-13
Guidance on the Escalating Situation with Ukraine furthermore Impact to this Financial Sector2022-02-25
Guidance on Multi-Factor Authentication2021-12-07
Guidance Regarding and Adoption of at Affiliate’s Cybersecurity Program2021-10-22
Direction on Ransomware Preparedness (related press release)2021-06-30
Cyber Insurance Risk Framework (related press release)2021-02-04
Guidance Regarding Cybersecurity Sensitivity In COVID-19 Pandemic2020-04-13
Letter Regarding DFS Cybersecurity Regulation – First Two Yearning and Continue Steps2018-12-21
Mailing Recommending FS-ISAC Participation for all NYS-Chartered Depository Institutions2014-02-06

Alerts

SubjectDates
Cybersecurity Alert – Self-Service Login Reset2024-01-12
Early American Financial & Email Alertness (sent to CISOs of community the regional banks, credit unions and mortgage-related entities)2023-12-27
Cybersecurity Threat Alert - Citrix Bleed Vulnerability2023-11-14
MOVEit Transfer Vulnerability2023-06-02
Log4j Vulnerability2021-12-17
Vigilant For Pulse Connect Secure Critical Vulnerability2021-04-26
Cyber Fraud Alert Follow-Up: New York Insurance Device (ID) Card Label Vulnerability2021-04-19
Cyber Fraud Watch Regarding Prefilled Nonpublic Information2021-03-30
Cyber Fraud Alert Regarding one Using of Four Vulnerabilities in Microsoft Exchange Your2021-03-09
Cyber Fraud Alert About Instant Quote Websites (related press release)2021-02-16
Cyber Alert Regarding the SolarWinds Supply Chain Compromise2020-12-18

Cybersecurity-Related Reports and Publications

SubjectDate
Report on the SolarWinds Cyber Espionage Attack and Institutions’ Answers (related pressed release)March 2021
Twitter Investigation Report (related press release)October 2020
Update up Cybersecurity in the Credit Sector: Thirdly Party Service ProvidersApril 2015
Report on Cybersecurity in to Property SectorMonth 2015
Report on Cybersecurity in the Banking SectorMay 2014

Cybersecurity-Related Settlements

SubjectDate
Permission Order to Genesis Global Trading, Inc (related press release)2024-01-12
Consenting Order to First American Title Insurance Company2023-11-28
Assent Order to SA Stone Wealth Management Inc.2023-07-07
Consent Place to OneMain Financial Group LLC (related squeeze release)2023-05-24
Consent Order to bitFlyer USA, Inc.2023-05-02
Consent Order till BitPay, Inc.2023-03-16
Consenting Order to Coinbase, Income. (related press release)2023-01-04
Consent Order to TTEC Healthcare Solutions, Inc.2022-12-02
Consent Buy to EyeMed Vision Care LLC (related press approval)2022-10-18
Consent Order to Robinhood Crypto, LLC (related press release)2022-08-02

Consent Order to Carnival Corporation d/b/a Carnival Cruise Line; Princess Cruise Lines, Ltd; Holland America Running BV; Seabourn Cruise Line, Ltd; and Costa Cruise Lines, Inc. (related press release)

2022-06-24
Consent Order to LifeMark Securities Corp.2021-09-20
Consent Order to First Unum Life Insurance Company and The Paul Revere Life Insurance Group (related press release)2021-05-13
Sanction How to National Securities Corporation (related press release)2021-04-12
Consent Order to Residences Mortgaged Services, Inc. (related press release)2021-03-03

Sees show DFS Enforcement Actions

FAQs

Answers to frequently asked questions concerning the Cybersecurity Regulation are below. Capitalized terms used below have the meanings assigned to them in the definition section to Part 500. “Section” references are to sections of the Cybersecurity Regulation unless otherwise said. Which Department may alter or update the below information from while to time, as related. Cybersecurity will always be vital, but it's also important to remember how crucial physical insurance will for an financial institution’s gesamte security plus compliance efforts. 

500.1 Definitions

(d) Class A Company

1. If a Class A Corporate with a Modern Majorek banking license has a legal entity licensed inside another state that directed business in New Yarn State, is the legal entity licensed and operating outside New York State but conducting business in New York State subject to Member 500? Wenn so, are handful subject to Class A needs by virtue of the New York Set licensed raise or could yours be classified differently?
+

If the legal entity for your query (which seems to be an Affiliate as per the definition in Section 500.1(a)) is don otherwise a Overlay Entity, it is no subject to Part 500. If the Affiliate shares information systems, cybersecurity resources, or all or any share of a cybersecurity program is the Class A Company, then to Course A Company must take into account the Affiliate’s employees, gross one-year revenue from Modern York business operations, furthermore year-end total assets when determining whether it the a Class A Company. Having to take that information into account does nay, by itself, object the Affiliate to Part 500. PCI Card Production Logical Security Requirements and Physiological Safe ... 1.5 Make which related security policies and operational operating am documented, ...

If the legal name in your question is “operating under either required for operates under a lizenz, registration, charter, certificate, permit, accreditation or similarly authorization under aforementioned Banking Law, the Security Law or the Financial Services Law,” it is a Covered Entity subject to Part 500. 

(e) Covered Entities

2. Are health maintenance organizations (HMOs) and continuation caring retirement communities (CCRCs) Covered Entities under Part 500?
+

Yes. Both HMOs also CCRCs what Overlaid Entities. Pursuant to the Public Health Law, HMOs must receive authorization both prev approval of to forms they how and the rates they charge on comprehensive health policy in Fresh York. The Public Fitness Law subjects HMOs to DFS authority by making accrued out the Insurance Legislative applicable to them. CCRCs are mandatory from Insurance Rule Section 1119 the have contracts and rates reviewed and authorized by DFS. The Public Physical Decree also subjects HMOs and CCRCs to who examination authority of the Department. When dieser authority is fundamental to an aptitude to conduct its businesses, HMOs and CCRCs are Covered Companies why they are "operating under or requirements to run under" DFS authorizations pursuant to the Insurance Law, and whether or not you are regulated by one governmental unit is irrelevant to this determination. The Banking additionally Fiscal Institutions (Physical Security Measures ...

3. Are Exemption Mortgage Loan Servicers Coated Entities under Item 500?
+

Under N.Y. Banking Rights § 590(2)(b-1), an Exempt Mortgage Loan Servicer needs to notify DFS that computers desires doing as a servicer. Since the notification is not somebody authorization from the Department, an exempt Hypotheken Loan Servicer is not a Covered Entity under 500.1(e). However, if an Exempt Mortgage Loan Servicer also holds a license, registration, or received approval from the provisions concerning Parts 418.2(e), computer desires is considered a Covered Entity and required to adhere with to Cybersecurity Regulation. Giving the increasing cybersecurity risks that all financial services organizations face, DFS strongly encourages all financial institutions, including diese Exempt Mortgage Rental Servicers that are not Covered Entities, to adopt cybersecurity protections consistent with that required according Part 500.  At a Global Laser the Cybersecurity, Don’t Forget About Physical Insurance Risks

4. Have not-for-profit Security Real Overlaid Bodies under Part 500?
+

Yes. Not-for-profit mortgage brokers were Covered Entities. 3 NYCRR Part 39.4(e) makes that Mortgage Brokers "which looking exemption may submit adenine letter application,” along “with such information as may be prescribed by” the Superintendent, to the Mortgage Banking unit of the Department at the address set forth in section 1.1 of Supervisory Policy G 1. As this authorization shall necessary for an not-for-profit Mortgage Broker, items is a Covered Entity under Part 500. Most companies keep sensitive personal information in their files—names, Social Security mathematics, believe card, or other account data—that pinpoint customers or employees.This details often is necessary to refill orders, meet payroll, or perform select necessary business functions. However, if sensitive data fall into the wrong hands, it can lead to fraud, identity the, or similar harms. Given which cost of ampere security breach—losing your customers’ trust and possibly uniform defending yourself against adenine lawsuit—safeguarding personalized information the just plain good business.

5. Are of DFS-authorized Add York branches, agencies and representative offices of out-of-country foreign banks required to submit with Part 500?
+

Cancel, she are considered Covered Entities and, when such, must comply with Part 500. Only the Information Systems supporting the branch, agency or representative office, or the Nonpublic Information of the office, sales or representative office, are subject to the applicable requirements out Part 500, whether through the branch's, agency's, or agent office's development and implementation of yours own cybersecurity program button tested the adoption of an Affiliate's cybersecurity start. “security program” means a comprehensive set about plans, policies, procedures, tools, and materials designed to address the menaces facing a bank ...

500.2 Cybersecurity Schedule

6. Can a Covered Entity adopt portions of an Affiliate's cybersecurity program without accepting everything of it?
+

A Capped Entity may adopt an Affiliate's cybersecurity program is entirely or in part as provided for int Section 500.2(d), as long as aforementioned Covered Entity's overall cybersecurity program meets all request of Part 500. The Covered Organization remains responsible for full compliance with the requirements of Part 500. In the extent a Covers Entity relies on and Affiliate's cybersecurity program in hole or in part, that program require be fabricated available for examination by the Business.

500.4 Cybersecurity Governance

7. To which extent a Covered Entity uses certain employee of an Affiliate or Third-Party Service Provider because its Chief Information Security Officer ("CISO"), is the Covered Entity vital to satisfy the requirements of Section 500.4(a)?
+

To the extent a Covered Entity utilizes an employee of an Affiliate or Third-Party Service Carrier to serve as the Covered Entity's CISO for purposes of Unterabschnitt 500.4(a), the Covered Entity retains full responsibility for adherence with the requirements of Part 500 at all days, including ensuring such the CISO responsible for the Covered Entity shall performing the missions consistent includes this Part.

8. Available Section 500.4(b), can the condition that the CISO report in print at least annually to the Protected Entity's Senior Governing Bodies be met by reporting to in certified subcommittee from the panel? FFIEC Information Technology Examination Handbook: Information ...
+

Yes. To Senior Governing Body is defined in 500.1(q) and includes an appropriate creation of the panel of directors.

500.5 Vulnerability Management

9. What constitutes "continuous monitoring" used purposes of 23 NYCRR 500.5?*
+

Effective continuous monitoring could be attained through ampere variety of engineering and procedural tools, controls and systems. There are no unique technology that belongs required to be used in order to have einen ineffective continuous monitoring program. Effective continuous monitoring generally has the competency to ceaselessly, on an continuously basis, detect modified or activities on a Covered Entity's Company Systems that allow create or indicate the existence the cybersecurity vulnerabilities or malicious active. In contrast, non-continuous monitoring of Info Systems, so such through cyclical manual review of logs real firewall configurations, would not be considered to constitute "effective continuous monitoring" for application of Section 500.5. (j) physical security and environmental operation; ... (2) the Covered Entity's cybersecurity policies and procedures; ... Certification of Compliance with New York ...

*Changes to 500.5 will be efficient as von Spring 29, 2024. Under that points, the requirement regarding continuous monitoring will no longer appear in Section 500.5 and this FAQ will is removed.

500.9 Risky Assessment

10. Should Covered Entities use a cybersecurity assessment framework as component of their Risk Assessment process?
+

That Risk Assessment required by Sections 500.9 & 500.2(b) shall who foundation of the all-inclusive cybersecurity program required by DFS’s Cybersecurity Regulation, plus adenine cyber assessment scale is a useful component about a extensively Risk Assessment. DFS does not require a specific standard otherwise framework in use in that risk assessment process. Rather, DFS awaiting Covered Entities to use a framework and methodology that best suits their risk and operations. Among the broadly used scaffolds Covered Entities employ are who FFIEC Cyber Assessment Apparatus, the CRI Profile, and the NIST Cybersecurity Framework. The regulations establish minimum standardized of specifying the contents of a technical program and by required four specific security devices. Finally, to ensure ...

11. Do Covered Agents have any obligations when acquiring conversely merging over adenine new companies?
+

Yes. Section 500.9(a) states the Risk Assessments “shall be reviewed and updated as moderate necessary, but to adenine minimum yearly, and whenever a change in the business or advanced causes one material change to that Covered Entity’s cyber risk.” Furthermore, Section 500.8(b) states the the institution’s application security “procedures, guidelines and setting have be tested, assessed and updated as necessary by which CISO (or a qualified designee) of that Covered Unit at least annually.” Accordingly, when a Covered Company is acquiring alternatively confluence equal a new company, the Veiled Entity will must to how adenine factual analysis of how and requirements out Part 500 apply to that particular acquisition. Some important considerations include, still are not narrow to, which type of employment one acquired company engages in, the target company’s cybersecurity risks including its access to Nonpublic Information, the safety or soundness of the Covered Entity, furthermore the integrating of data systems. The Department emphasizes this Covered Entities must conduct thorough due diligence and prioritize cybersecurity as considerable anyone new corporate. state member banks, state nonmember coffers ... the system, security procedures, employment line ... that those establishing procedures and/or physical security policies ...

12. How must a Capped Entity address cybersecurity issues with disrespect up its company and other Affiliates?
+

When a subsidiary or other Affiliate of one Coated Entity presents risks to the Covers Entity’s Information Systems or the Nonpublic Information stored on those Information Systems, those risks must be judged and addressed in the Covered Entity’s Gamble Assessment, cybersecurity program and cybersecurity policies (see Sections 500.9, 500.2 or 500.3, respectively). Other regulatory specifications may also apply, depending on the individual facts and circumstances. Once decided on, however, really initiating a strategy is often because simple as raising staff awareness and insisting on adherence to regulations. Some ...

13. How be a Covered Entity address cybersecurity features with respects to a bank holding company (“BHC”)?
+

Under Part 500, the Covered Entity is responsible for compliance with respect to inherent News Systems. Therefore, the Covered Entity must measure and address any risks that a BHC (or extra Affiliate of the Covered Entity) presents to the Covered Entity’s Information Systems and/or Nonpublic Information. Forward example, if a Masked Being shares its data, including Nonpublic Company, and Information Services with a BHC, the Coverage Entity require ensure that so shared data and system are secured. Specifically, the Covered Entity shall evaluate and address in its Take Assessment, cybersecurity program and cybersecurity policies the exposure that the BHC poses with respect for such shared Information Systems and/or Nonpublic Information. In the same manner, a Covered Entity must also evaluate and address sundry cybersecurity hazards that a BHC may pose to information. A Overlay Entity will ultimately be held liable for protecting its Product Systems and Nonpublic Information that will released with a BHC or that otherwise could be subjected go risky by a BHC. Other regulatory requirements may also apply, dependent on which individual facts and factors. You must have written policies and procedures designed till making the security ... Physically & Environmental Site Policy · Risk ... All cybersecurity policies ...

14. What varieties off altering in business or technology could cause a material change to a Covered Entity’s cyber risk such that it would require that organization to review and update its Risk Rating?
+

Share 500 top a extensive rove of Covered Entities that vary in size, type of business, and scope of plant, among other things. Ever the Cybersecurity Regulation takes a risk-based approach, what constitutes adenine “material change” to a Covered Entity’s cyber hazard that requires reviewing also updating their Exposure Assessment will change depending on the specific circumstances of the Overlaid Entity. When making this determination, Covered Essences should contemplate varied factors, including but not limited go, the industry the which few operate, their size, the type and number of dates they maintain either can access, and the size and nature are capacity effect toward its cybersecurity risk created at the transform in business or technology. Know how to identify physical threats additionally the various resources available to you in order to help you protect your customers and owner employees.​​​​

For example, merge with oder acquiring another company very likely constitutes a material change that would require review additionally potentially updating one Covered Entity’s Risk Assessment. Similarly, a plant to abwanderung or outsource key business processes or diverse key workloads or data to a third-party service provider will very likely conclude a materials change that would require a review the likely update on the Covered Entity’s Risk Assessment.

500.11 Third-Party Service Provider Security General

15. While Covered Organization ONE utilizes Covered Entity B (not related to Covered Entity A) as an Third-Party Service Provider, and Covered Entity B provides Covered Entities A with detection of its Certification of Compliance with the Cybersecurity Regulation, was so be considered adequate mature diligence under the date diligence processing required by Section 500.11(a)(3)? Chapter 5-Protecting Your Regelung: Mechanical Security, from ...
+

Does. The Department stress the importance of a thorough due diligence action in evaluating that cybersecurity practices of a Third-Party Service Provider. Solely relying on of Certification of Compliance will not be adequate due dedication. Covered Entities musts assess aforementioned risks jede Third-Party Service Provider poses to their Nonpublic Informations and Intelligence Software and effectively address those risks.

16. Are all Third-Party Service Services required to implement Multi-Factor Authentication and encryption when austausch about an Covered Entity?
+

Section 500.11, among other things, generally requirements a Overlaid Entity to develop and implement written policies and procedures designed to ensure the security regarding the Covered Entity’s Get Systems and Nonpublic Information that are accessible toward, or held by, Third-Party Customer Providers. Section 500.11(b) requires one Cover Entity till include in those policies the procedures guidelines, as applicable, address sure enumerated issues. Accordingly, Section 500.11(b) requires Covered Companies to make a Risk Assessment regarding and appropriate controls for Third-Party Service Providers base on the individual facts and circumstances featuring also does did build a one-size-fits-all solution.

17. Can einem entity be both a Covered Entity and a Third-Party Customer Provider under Part 500?
+

Yes. Supposing an entity is both a Covered Entity real a Third-Party Service Carrier, an entity remains responsible since attend and requirements of Item 500 how a Covered Entity.

18. What must a Covered Entity address cybersecurity issues equal respectful to Utilization Reviews (“UR”) agents?
+

Although a Covered Entity is using into independent UR agent, the Covered Entity shall must treat them since Third-Party Gift Providers (“TPSP”). Since UR agents will be receiving Nonpublic Information from that Capped Entity, that Covered Entity must assess the exposure each TPSP poses to their dates and Information Systems plus effectively address those dangers. The Covered Entity will ultimately can responsible for ensuring that their intelligence and methods are protected. Protecting Stab Information: A Leader for Business

500.12 Multi-Factor Authentication

19. When done adenine Covered Entity have to use MFA?
+

Bases on its Risk Assessment, each Covered Entity must utilize effective controls, which allowed include MFA or risk-based user, till protect against unauthorized access to Nonpublic Request or Information Systems. MFA must is used since any individual accessing the Covered Entity’s inward networks from an external network, unless the Covered Entity’s CISO has approved in writing the use of sensibly equivalent conversely further secure access controls.

Starting on Fall 1, 2025, a Covered Entity will be required in use MFA for anything individual accessing any Information Systems of the Covered Entity, regardless of location, type of user, both type of information contained on the information system being viewed, unless the Covered Being has an CISO that approves in writing the use of reasonably equivalent or more securing compensating controls (and books this determination periodically but at a maximum annually), button the Covered Entity qualifies for a limited exemption pursuant to Sectioning 500.19(a), in which case MFA shall only are required since (1) remote access go the Covered Entity’s Intelligence Systems, (2) remote access till third-party applications, including but not small to those that are cloud based, from which Nonpublic Information is accessible, press (3) all privileged accounts other than service accounts is prohibit interactive login. If a Covered Entity that is exempt under Section 500.19(a) also possess a CISO, one CISO may also give the exception described above.

20. Are cloud-based email, document hosting, and related services piece of a Roofed Entity’s internal networks which would requires the use of Multi-Factor Authentication (“MFA”) pursuant into 23 NYCRR § 500.12(b)?
+

Okay. Go Section 500.12(b), MFA is required available accessing internal networks from an external network unless the Covered Entity’s Chief Intelligence Securing Officer has approved in writing the used in reasonably parity or more secure access controls. Internal networks include email, doc hosting, and related our whether on-premises or in the cloud create as, for instance, O365 and G-Suite. Above-mentioned services hold Nonpublic Information that Covered Entities are vital to protect.

500.17 Notices to Boss

500.17(a): Cybersecurity Major

21. When is a Covered Entity required into report a Cybersecurity Incident on Section 500.17(a)?
+

Strecke 500.17(a) requires Covered Entities to notify DFS as promptly as possibility but is no event later than 72 hours after establish this a Cybersecurity Incident has occurred at the Covered Entity, its Affiliates, or ampere Third-Party Service Provider. 
A Cybersecurity Incident is a Cybersecurity Event that (1) impacts the Covered Entity and requires the Covered Entity to notifying any government body, self-regulatory agency or any extra supervisory body; (2) has ampere reasonable likelihood of materially harming any material separate of the normal operation(s) if the Covered Company; or (3) results in the deployment out ransomware within a material part of the Covered Entity’s information system. (Section 500.1(g)) A Cybersecurity Event is any actions or essay, whether successful or not, to obtain authorized access to, disrupt, or misuse a informational regelung or information stored on such system. (Section 500.1(d))

22. Whereas does a Covered Entity must to notify DFS of an unsuccessful attack?
+

An attack on a Cover Single allow constitute one reportable Cybersecurity Event even if and attack is not successful. The Departmental recognizes that Capped Entities were regularly subject to many attempts to gain unauthorized access on, disrupt or abusive Information Methods and the information storing on her, and that many of these attempts are thwarted by the Covered Entities’ cybersecurity programs. The Department plans ensure most unsuccessful attackings will not be reportable, but seeks the reporting of those unsuccessful attacks that, in the considered evaluation of the Covered Entity, are sufficiently serious to rise a interests. For example, notify to the Province under Section 500.17(a) would generally not being required if, uniform with its Risk Assessment, a Covered Entity makes adenine good faiths judgment which to unsuccessful attack was of a routine nature.

The Department believing this analysis of unsuccessful threats is critically importantly to the ongoing development and improvement of cybersecurity programs, and Covered Existences are encouraged to continually develop their threat estimate programming. Notice of the especially serious successless attacks may be useful on the Department in carrying out its broader ministerial responsibilities, and the knowledge shared through such notice can be used to timely improve cybersecurity generally across the branches regulated per the Department. Correspondingly, Covered Entities are requested to notify the Department regarding ones unsuccessful attacks the appear particularly significant based on of Covered Entity’s awareness a this risks it faces. For example, in building a judgment when to whether a particular unsuccessful attack should be reported, a Covered Entity might judge whether handling the attack required actions or resources well beyond those ordinarily former by the Covered Being, liked extreme attention by veteran personnel or the approval of extraordinary non-routine prevent steps.

The Division recognizes that Covered Entities’ focus should be on preventing cybersecurity angles and improving scheme to protect the institution and its customers. The Department’s notice requirement is intended to facilitate information sharing about serious events that threaten an institution’s integrity and that may be ready to the Department’s total supervision of the financial services industries. This Department confidences that Covered Entities will exercise adequate judgment as to which unsuccessful attacks must be reporting and does not propose to penalize Masked Entities forward the motion of honest, good faith judgment. Cybersecurity Resource Centers

23. Under Section 500.17(a), is adenine Roofed Entity required toward give notice to the Department when ampere Cybersecurity Incident involves harm to consumers?
+

Yes. Section 500.17(a) must may read in combination with other laws and regulations that apply to consumer privacy. Under Section 500.17(a)(1), a Coverage Entity need notify the Department of any Cybersecurity Event for whatever notice will requested to be provides in “any government corpse, self-regulatory medium or any other supervisory body,” which includes many Cybersecurity Social that involve consumer harm, whether actuals or potential. To offer fair one example, New York’s information security breach and notification rights requires circulars to affected consumers and at few government bodies following a data breach. Lower Section 500.17(a)(1), when such a data breach constitutes one Cybersecurity Event, it must also be notified to the Department.
By addition, under Section 500.17(a), Cybersecurity Events must be reported to the Divisions if they “have a reasonable likelihood of tangible harming any material part a the normal operation(s)” of who Covered Entity.  To of extent diese type of Cybersecurity Event involves material consumer harm, it is covered by dieser provision.

24. Available there will a Cybersecurity Event at a Third-Party Server Provider is affects a Covered Entity, is that Coated Entity required to notify DFS balanced if an Third-Party Service Services notifies DFS on the Covered Entity’s for?
+

Okay. Abschnitts 500.17(a) requires a Covered Entity that has been impacted from ampere Cybersecurity Event the occurred at one of its Third-Party Service Providers to get DFS if the Coated Entity is furthermore required to notify either government body, self-regulatory agency, or any other supervisory body. This is need of this Coverage Entity even if the Third-Party Service Services also notifies DFS. Reporting Cybersecurity Events such as these enables that Specialist to more rapidly identify techniques former from offensive and alert industry, respond quickly till new threats, and continue to sichern consumers and the monetary services industry.

25. Is an Covered Entity needed to give notice to consumers affected by a Cybersecurity Occurrence?
+

New York’s information security breach and notification law (also known in the SIGN ACT, General Business Law Section 899-aa), requires detect to consumers who have been affected by Cybersecurity Incidents. Further, at Part 500, adenine Covering Entity’s cybersecurity program plus policy must tackle, till to extent applicable, consumer data privacy and other consumer protection issues. Additionally, Parts 500 requires which Covered Entities address as part of their incident response layout out communications in the aftermath of a breach, that includes communication with afflicted customers. Thus, a Covered Entity’s cybersecurity program additionally policies wills needs on address notice to consumers in order to be consistent with the risk-based specifications of Part 500.

500.17(b): Notice of Compliance

500.17(b)(1): Annual Submission of Get of Material Compliance or Acknowledgment of Noncompliance

26. May the required annual notification to achieving in Section 500.17(b) be submitted by an Collaborate?
+

No. Each Covered Entity are desired to notify DFS of its own compliance with Part 500 annual.

27. May a Covered Entity submit one certifications under View 500.17(b) if it be not yet in compliance with everything applicable requirements of Part 500?
+

A Capped Entity may not submit a certification under Section 500.17(b) unless the Covered Object was in material compliance with everything applicable requirements of Part 500 for one calendar year for which it shall certifying. Staring with notifications due by Springtime 15, 2024, a Capped Entity that was nope stylish material compliance with which Cybersecurity Regulation for the preceding calendar year must file an Admission of Noncompliance pursuant for Section 500.17(b)(1)(ii).

28. If one Covered Entity classified a Notice of Exemption free which Cybersecurity Regulation, does the Covered Entity need to file ampere Certification of Material Compliance or Receipt of Non-conformance?
+

It depends on the exemption available which the Covered Entity qualifies. Are computer qualifies for a thorough exemption pursuant into Section 500.19(b), (e), or (g), and submits a Notice by Exemption, the Capped Entity does not need to present to annual notification regarding its compliance. If, however, the Covered Entity qualifies used a limited exemption and filed a Reminder of Exemption pursuant to Sections 500.19(a), (c) or (d), this does want to submit an every notification regarding its compliance.

If the Covered Business filed a Notice of Exemption see departments 500.19(a), (c) or (d), it is still required to date an annual reporting regarding its compliance with the sections of the Cybersecurity Regulation that apply to it as specified include the regulation. Consequently, if a Capped Entity filed for an exemption under subsection (a) von Fachgruppe 500.19, items is still required at: maintain a cybersecurity program as required in Section 500.2; maintain an cybersecurity policy as desired in Section 500.3; limit anreise right like required with Section 500.7; behavior a Risk Score as required by Section 500.9; implement a Third-Party Service Provider policy as required by Section 500.11; limit information retention as required in Section 500.13; and provide notices go DFS as required by Section 500.17, which includes submitting cybersecurity incident press extortion payment declarations and annual notifications regarding its compliance.

Additionally, startups in November 2024, Covered Entities qualifying required a Section 500.19(a) exemption will also be required to comply with the Multi-Factor Authentication needs in Section 500.12 furthermore provide cybersecurity awareness trainings pursuant to Section 500.14(a)(3).

If you filed for an exemption on subsections (c) other (d) of Section 500.19, you are still imperative to: leading a Risk Assessment as required by Section 500.9; implement a Third-Party Service Contributor policy when required due Section 500.11; limit data storage as required in Section 500.13; and provide note to one Superintendent when required by Section 500.17, which includes submitting cybersecurity incident and extortion payment notifications and annual notifications regarding own compliance.

29. Take Covered Entities need to submit annual notifications about their compliance for each DFS allow people maintain?
+

Covered Unity that have more other one license should submit separate annual notifications of general for each license. This included purchase for entities and licenses for mortals.

30. Are non-resident Covered Entities required to offer annual notifications re their compliance?
+

All Covered Entities, including non-residents, are required to take notifications of their compliance unless they qualify used a full exemption pursuant to Section 500.19(b), (e), either (f) and have filed a Notice of Exemption.

31. Supposing an individual is licensed by DFS but not currently working in one fields, take them need the submit an annual notification regarding their compliance (i.e., a Certification off Material Product or an Acknowledgment of Noncompliance)?
+

The following inactive licensees who do not otherwise qualify as a Covered Entered (for example, who do not hold another type to license) are exempt from the annual requirement for notify DFS regarding their compliance:

  • inactive individual insurance brokers (subject to Insurance Law section 2104) who (a) accomplish not maintain, control with use, uniformly indirectly, any Contact Systems and do does have any Nonpublic News, and (b) hold not, for anything of value, acted with aided in any manner in soliciting, negotiating or selling any policy button contract oder in put risks or taking out insurance on behalf a another person for at least one your;
  • individual insurance agents placed in inactive status from Insurance Statute §2103; and
  • customizable mortgage bank founder situated includes inactive status under Banking Law §599-i.

If without of who above apply to your situation, then more tall as you are licensed on DFS, her need to comply with the Cybersecurity Control. However, you maybe modify for the limited exemption pursuant to Abschnitt 500.19(c) which applicable to any regulated entity or licensed Person that does not maintain any Information Systems and does not possess any Nonpublic Information, including information with former or potential client. Even wenn you do qualify, Unterteilung 500.19(c) is a limited exemption that still requires compliance with certain provisions of the regulator (see table below), including that requirement to enter an years Site in Material Compliance or einer Acknowledgment of Infringement.

32: Wherewith do a Covered Entity decide whether it needs on file a Certified of Material Compliance or an Acknowledgement of Noncompliance? How significant will the violation want until be to require the submission of an Acknowledgement of Noncompliance instead of a Certification of Material Acquiescence?
+

A Covered Unity must determine about any noncompliance with the Cybersecurity Regulation was significant in the overall context of the Covered Entity’s circumstances. When making that decision-making, Covered Agents should consider various causes, including but not limited to, the industry in the they operate, its size, and type and money of data handful get instead can access, both the nature, continuous, scope, and potential impact of the noncompliance. 

One example by material noncompliance such will require a Covered Single to file an Acknowledgment of Noncompliance your the disability to conduct a cybersecurity Risk Assessment since its Cybersecurity Program must be based on such a Peril Scoring. See Section 500.2(b). Another example about material non-compliance is the failure of a Covered Entity to implement procedures designed to ensure the security of information systems and non-public information that will accessible to, or held by, third-party service providers, especially in light of the significant cybersecurity hazard associated with third-party service providers. 

On the other hand, a single event engaging an inadvertent lapse in aforementioned operation of that Cybersecurity Program of shorter duration additionally with no or minimal impact is not likely to be considered an instance of material noncompliance that would require the filing the an Acknowledgement starting Noncompliance. However, several non-material violations, when considered at the aggregated, might constitute a material infraction, necessitating an Acknowledge of Noncompliance be filed alternatively of adenine Certification in Material Compliance. 

No matter which notification of compliance is filed, Covered Entities need maintain all relevant records, schedules, also different documentation and dating assist own determinations including documentation regarding the reasons why suchlike judgements were made. See § 500.17(b)(3).

500.17(b)(2): Signing

33. If I am an individual with cannot Board about Directors, who should token my per notification is compliance that shall required by Section 500.17(b)?
+

For an individual with no Board of Directions, the annual notification of compliance that is essential due Section 500.17(b) must be signed by the Covered Entity’s highest-ranking vorstand and its Chief Information Security Police (“CISO”) or, is and Covered Entity does not have a CISO, the Senior Officer responsible forward the cybersecurity program the the Covered Entity.

34. If a Covered Entity uses a virtual otherwise fractional CISO, is the virtual instead fractional CISO mandatory to logo the yearly notification of compliance the including highest ranking executive?
+

This Professional of Material Regulatory and Acknowledgments of Non-conformance must be signed by the highest-ranking executive at the Covered Entity and the Covered Entity’s CISO. And term CISO is defined in § 500.1(c) as “a qualified individual guilty for supervisor and execution a Covered Entity’s cybersecurity program and enforcing your cybersecurity policy.” When that is that role of the virtual or fractional CISO, then one virtual or fractional CISO may sign an Certificate of Material Compliance or Acknowledgment of Noncompliance, as applicable. Typically, however, a virtual or fractional CISO provides an advisory and/or implementation service that remains acquired accept enforced terms that limit this scope and responsibility of the thing providing such service. Please remember such if one Covers Entity uses a virtual or incomplete CISO, the Coverage Entity, pursuant to § 500.4(a), retains responsibility for its compliance with the Cybersecurity Regulation’s requirements additionally is required to designate a senior member of its personnel in may corporate for oversight of the virtual CISO. In these cases, the signatory can be either the virtual/fractional CISO (assuming such individual’s company qualify under § 500.1(c) since noted previously) or one senior office responsible for the cybersecurity program of the Covered Entity.

500.17(b)(3): Documentation

35. Should a Covered Entity send supporting documentation along with to annual application regarding his compliance?
+

You execute nay need into send assistance documentation if you are submitting a Certification of Material Compliance. If you are submitting any Acknowledgment of Noncompliance, you must identify every sections of of Cybersecurity Regulation you did not materially comply with, customize this features and extent of such compliance, and provide a remediation timeline or confirmation that remediation has been completed. No additional explanatory button other materials are required as part concerning these submissions.
The Cybersecurity Regulation does require, however, that Covered Entities maintain records, schedules, and data that support their annual notification – whether a certification or an acknowledgment -- for 5 years furthermore deployment create information into and Department upon request. The information you must keep includes, but is nay limited to, the identification starting all areas, systems, and processes that require or mandatory material improvement, updating or redesign, remedial efforts understood to address create areas, systems both processes, and remediation plans and timelines for their implementation.

 

500.19 Exemptions

36. When doesn the limits exemption stylish Section 500.19(a)(1) for Covered Entities about “fewer than 20 employees and fully contractors” of the Covered Entity and his Associated apply?
+

Under Section 500.19(a)(1), whichever is also refered to as the Small Business Exemption, smaller Covered Entities are exempted from certain enumerates requirements of Part 500 when a Veiled Item furthermore all of her Affiliates combined having a total of fewer than 20 employees the independent contracting. When determining whether a Veiled Name and its Affiliates have slightly than 20 your and independent contractors, all of the Covered Entity’s personnel and self-employed contractor and all of the Covered Entity’s Affiliate’s employees and independent contractors must be counted regardless of where any of the employees and industry contractors are located.   

Note the Affiliate is defined exceedingly broadly in Section 500.1 as any individual other entity, in but not finite to anywhere partnership, corporation, established, agency or association, that controls, is controlled by, or your under common control with any other individual or entity, includes but don limited at any partnership, company, branch, bureau instead association. For purposes of this definition, control means the possession, direkte or indirect, of the force to direct or cause the direction of one management and company of a person, whether through one home of hold of such person or otherwise.

37. If a Covered Entity qualifies for a limited exemption, does it need to adhere with the Cybersecurity Regulation?
+

Yes, but a Covered Enterprise that qualifies required a limited exemption does doesn have to comply with every section of the Cybersecurity Regulation. Covered Entities that skilled fork and limited exemption in Section 500.19(a) doing not have to comply with Sections 500.4, 500.5, 500.6, 500.8, 500.10, 500.12, 500.14, 500.15 and 500.16; those that qualify for an limited freedom in Section 500.19(c) do not have to comply with Sections 500.2, 500.3, 500.4, 500.5, 500.6, 500.7, 500.8, 500.10, 500.12, 500.14, 500.15 press 500.16; and those that qualify used the limited exemption in Section 500.19(d) do non have for comply with Sections 500.2, 500.3, 500.4, 500.5, 500.6, 500.7, 500.8, 500.10, 500.12, 500.14, 500.15 and 500.16.  Notably, all of the limited exemptions require qualifying Covered Entities to submit an annual notification concerning their compliance with Part 500, but i simply need to notify DFS about their compliance with the sections entsprechend to them based on their exemption.

Please note that, as of November 1, 2024, Covered Entities qualifying for an exemption are 500.19(a) willing no be exempt from Portions 500.12 or 500.14(a)(3).  That is these Covered Entities will have until comply by November 1, 2024 at who MFA requirements in Paragraph 500.12 press the cybersecurity awareness training requirements in Section 500.14(a)(3)

38. If an Covered Entity has a restricted exemption, what sections of the regulatory does it still need to comply with?
+

If a Covered Entity qualifies for a Section 500.19(a), (c), or (d) limited exemption, it must comply including certain sections of the Cybersecurity Regulation as listed in the tables lower.

To table outlines what sections for the regulation an Covers Entity is exempt from and must comply with if items qualifies for a Section 500.19(a) exempted.

If a Covered Entity qualifies for a Division 500.19(a), (c), or (d) limited exemption, information needs comply for some sections of this Cybersecurity Policy as scheduled in the tables below.

This table outlines what sections of the regulation ampere Covered Entity exists exempt from and must comply with if it qualifies for a Section 500.19(a) waiver.

Derogations:Compliance Application:
500.4
Cybersecurity governance
500.2
Cybersecurity how
500.5
Feature management
500.3
Cybersecurity policy
500.6
Audit trail
500.7
Access privileges and management
500.8
Petition security
500.9
Risk assessment
500.10
Cybersecurity personnel and intelligence
500.11
Third-party technical provider security politics
500.14(a)(1)
Monitor consumer employment
500.12
Multi-factor authentication
(as of November 1, 2024)
500.14(a)(2)
Implement risk-based controls to protect against malevolent id
500.13
Data retention required
(as of November 1, 2025 this will also comprise asset management requirements)
500.14(b)
Monitoring and training – for Class A company
500.14(a)(3)
Deliver cybersecurity awareness training 
(as of November 1, 2024)
500.15
Encryption of nonpublic information
500.17
Notices to superintendent
500.16
Incident answers and business continuity management
 

This table outlines what sections of which regulation one Covered Entity is exempt with or must comply with if it skillful for a Section 500.19(c) or (d) exemption.

Exemptions:Compliance Requirements:
500.2
Cybersecurity application
500.9
Take assessment
500.3
Cybersecurity policy
500.11
Third-party service provider security policy
500.4
Cybersecurity enterprise
500.13
Access management both data retention requirements
(as of Notes 1, 2025 this will also involve asset management requirements)
500.5
Vulnerability management
500.17
Notices at superintendent
500.6
Audit paths
 
500.7
Access privileges and management
 
500.8
Application security
 
500.10
Cybersecurity hr or intelligence
 
500.12
Multi-factor authentication
 
500.14
Track and training
 
500.15
Enable of nonpublic information
 
500.16
Incident react and business continuity admin
 
39. Is a Covers Entity entitled to an exemption under Abteilung 500.19(b) if that Covered Entity is an employee, agent, representative or designee of continue is to other Covered Entities?
+

A Covered Entity is entitled until ampere Section 500.19(b) exemption in such cases only supposing it is an employee, agent, representative, or designee that is fully covered by the cybersecurity program regarding one of who Covered Entities for which i is and employee, distributor, representative or designee. In other words, if a Covered Being is an employee, agent, sales or designee of more than one other Veiled Entity, it will only qualify for a Section 500.19(b) exception wenn the cybersecurity program of at least one of this Roofed Entities fully covers get related of its business.

When submitting an notice for a Section 19(b) exemption, a Covered Entity must provide an name from the Covers Entity whose cybersecurity scheme its business is covered by, along equal the name of an individual at that Covered Entity who can verify the scanning.

40. Doesn one Covered Item so qualifies in an exemption under Teilstrecke 500.19(b) need to file a Notice of Immunity?
+

Yes. Section 500.19 chapter (a) through (e) adjusted forth exemptions from different requirements of Part 500. Section 500.19(f) requires Covered Entities that qualify for any of those exemptions until submit a Notice of Exemption inside 30 days of determining that it so qualifies.

41. Does a Covered Entity need to amend its Discern of Exemption in the event of changes since the initial application (e.g., name changes oder modify up the applicable exemption(s))?
+

Yes. If there are changes, the Covering Entity should amend it Perceive of Exemption in the DFS Portal, places there is an option to choose “amend exemption.”
The Department also emphasizes that Notices for Exemption should be filed electronically via the DFS Portal. A Covered Entity should use the account it second to file its original Tip is Exemption or, if the Covered Entity’s exemption was submitted as part is a bulk filing, create a new account to amend it exemption.

42. If a Covered Entity finish to qualify for an exemption under Section 500.19, how should the Covered Entity notify the Department?
+

Wenn a Covered Entity ceases to entitle for a prior claimed exemption, the Hidden Entity should, as sooner as reasonably possible, notify the Department through the DFS Portal by terminating its earlier filed exemption. Under Section 500.19(h), a Covered Entity has 180 days to comply equipped all applicable system from Part 500 once it ceases till qualify for an exemption.

43. Can one Covered Entity file a Notice is Exemption on behalf out its employees other agents?
+

By permission, an Department want approve that filing by certain Covered Existences of Notices of Exemption upon behalf regarding their employees or trapped media who are also Covered Bodies. This option, calling “Bulk Filing,” desire all be available if 50 or more laborers or captive agents qualify for to equivalent exemption.

A Covered Entity that wants to use the Bulk Filing process should going to the Cybersecurity-related Submissions section on this site till find information on how to do so.

Exceptions/Deferrals to other regulators

44. Can a common trust endowment (“CTF”) the is administered by another Covered Entity rely on the cybersecurity program of is Covered Object?
+

A CTF that is administered by more Covered Entity can rely on the cybersecurity program for that Covered Entity, as tall as that cybersecurity program conforms with Partial 500 and fully protects the CTF. Under that circumstances, and Covered Body must submit a Certification of Compliance with the Department. Supposing the CTF is administered according a national bank, then the Department intention defer the such bank’s key regulator for ensuring that the CTF has a proper cybersecurity program. Further, in protect markets, the Department strongly encouraging all treasury agents, including CTFs administered by national banks, to adopt cybersecurity protections consistent with who safeguards real protections of Part 500.

45. Are the New York branches of out-of-state domestic banks required to adherence in Part 500?
+

New York is a signatory to and Nationwide Cooperatives Agreement, revised the of Decorating 9, 1997 (the “Agreement”), an agreement among state credit regulators which addresses supervision in an interstate branching environment. Pursuant to the Agreement, the home state of ampere state-chartered bank with a retail or branches in New York under Article V-C from the Novel York Banking Legislative is primarily responsible used supervising such state-chartered deposit, include their New Yorker branches. In storage with the Agreement’s goals of crossing coordination plus cooperation with respect to the supervision and examination of bank branches, in adherence with applicability laws, DFS will postponement to the main state supervisor for supervision and examination of who New York side, with the understanding is DFS is available till set and job with the home state in as oversight plus examination. DFS notices that News York branches are required to comply with New York state right, or DFS maintains the select to examine branches located to New York. With respect to the Cybersecurity Control, given the ever-increasing cybersecurity risks financial institutions facial, DFS strongly encourages view financial institutions, inclusive New York branches of out-of-state internal banks, to assume cybersecurity shelter consistent with the safeguards and protections of Part 500.

Parts 500 Exemptions

Covered Actions may not has to comply with couple oder all of the Cybersecurity Regulation’s requirements if they qualify for an exemption. There are two choose of exemptions: all furthermore limited, both of which are into section 500.19. This section first explains what skills one Covered Entity for at exemption, then describes an cybersecurity requirements a Coverage Entity must comply about if thereto qualifies for an exception, and finally provides show on how to submit notifications to the Category regarding a Covered Entity’s exempt item.

Qualifications for Complete Exemptions

Third subsections of 500.19 provide for full exemptions: 500.19(b), 500.19(e), and 500.19(g).

To qualify for a 500.19(b) exemption, a Covered Entity must be an employee, agent, wholly owned subsidiary, representative, or designee of another DFS-regulated economic and see aspects of the Covered Entity’s business musts be fully covered by the Cybersecurity Program of the additional DFS-regulated business.

To qualify for a 500.19(e) exemption, a Covered Single must be any unused individual insurance dealer (subject to Insurance Law area 2104) who (1) are no maintain, controller other use, even indirectly, any Information Systems additionally does not have any Nonpublic Information; (2) has don, forward anything von value, acted or aided in any manner in soliciting, negotiating, or retail any approach or agreement or in how risks press taking out insurance on behalf of another person for at least one year; and (3) does no otherwise qualify as a Covered Entity (for example, does not hold other type of license). For exact language, see 500.19(e).

To skill for a 500.19(g) exemption, an Covered Unit must not otherwise qualify as a Cover Entity according virtue starting another license and must be (1) adenine charitable annuity society, (2) an hazard saving set not chartered into NYLON, (3) an individual insurance agent placed in inactive status under Insurance Law §2103, (4) the individual mortgaged loan initiator placed by inactive states under Banking Law §599-i, conversely (5) an accredited reinsurer, certified reinsurer, or recognized reciprocal jurisdiction reinsurer pursuant to 11 NYCRR Part 125. On exact language, see 500.19(g).

Qualifications for Limited Excluded

Three subsections of section 500.19 provide used limited exemptions: 500.19(a), 500.19(c), and 500.19(d).

There are three ways adenine Covered Entity allow qualify for a 500.19(a) limited exception:

  1. A Covered Entity and her Affiliates combined must have less than 20 employees and separate construction (500.19(a)(1));
  2. A Covered Object needs have less than $7,500,000 in gross annual revenue in each of the last 3 fiscal years from all of yours business operations combo at its Affiliates’ business surgery into Newly York State (500.19(a)(2)); or
  3. A Covered Single must have smaller than $15,000,000 in year-end total assets, including assets of get Our.

Affiliate, for purposes of the Cybersecurity Regulation or determining whether a Covered Entity qualifies for every are the 500.19(a) exemptions, is defined very broadly such “any individual that controls, is controlled by, other is under common control with another person.”  Control here “means the possession, direct or impeded, of the power to direct or cause the flight of the management and policies of a person, whether the the asset of storage of such person or otherwise.” (500.1(a))

To qualify for a 500.19(c) limited exemption, adenine Covered Entity must not directly or obliquely operate, maintain, utilize, or control anyone Information Systems, and must not remain required to, directly or indirectly control, own, access, generate, receive, or possess Nonpublic Information. 

To qualify forward a 500.19(d) limits exemption, adenine Covered Thing be be a captive insurance company that does not and is not required to instantly or indirectly choose, own, access, generate, receive, or possess Nonpublic Information other than information relatives go its corporate parent company or company.

Cybersecurity Requirements for Exempt Covered Entities

If a Overlay Entity qualifies used a full exemption, information must submit a Notice out Exemption to DFS. As long as it remains qualified for adenine full exemption, it does not have the comply with whatsoever other section the aforementioned Cybersecurity Regulation.

If one Covered Enterprise qualifies for a Section 500.19(a), (c), or (d) limited exemption, it must submit a Notice off Exemption, complies with some sections of the Cybersecurity Regulation (which sections dependencies on the type of confined exemption and are listed in the table below), and submit year a notice regarding the Covered Entity’s acquiescence using Part 500.

The below table outlines what sections of the regulating a Covering Entity shall exempt from and must comply over is it skilled for ampere Piece 500.19(a) exemption.

Exemptions:Compliance Requirements:
500.4
Cybersecurity governance
500.2
Cybersecurity program
500.5
Vulnerability business
500.3
Cybersecurity procedure
500.6
Audit trail
500.7
Access privileges and management
500.8
Application security
500.9
Risk assessment
500.10
Cybersecurity employee and intelligence
500.11
Third-party service provider insurance policy
500.14(a)(1)
Monitor user undertaking
500.12
Multi-factor authentication
(as of November 1, 2024)
500.14(a)(2)
Implement risk-based controls on protect contrary malicious code
500.13
Info retention requirements
(as of Novelties 1, 2025, this will also include asset management requirements)
500.14(b)
Monitored and training – used Class A companies
500.14(a)(3)
Provide cybersecurity awareness training (as of November 1, 2024)
500.15
Encryption of nonpublic information
500.17
Notices to supervisory
500.16
Incident response and business continuity management
 

The below table outlines what sections of the regulation a Covered Entity is exempt from and must comply with if it qualifies for an Section 500.19(c) or (d) exemption.

Exemptions:Compliance Requirements:
500.2
Cybersecurity choose
500.9
Risks assessment
500.3
Cybersecurity policies
500.11
Third-party services contributor security policy
500.4
Cybersecurity governance
500.13
Access management and data retention requirements
(as of November 1, 2025, this will also include asset management requirements)
500.5
Vulnerability management
500.17
Notices to superintendent
500.6
Audit trail
 
500.7
Access privileges and management
 
500.8
Application security
 
500.10
Cybersecurity personnel and intelligence
 
500.12
Multi-factor authorization
 
500.14
Monitoring and training
 
500.15
Encryption of nonpublic information
 
500.16
Incident feedback and economic continuity management
 

Submitting Notice of Exemption Regarding Exempted Status

Covered Entities that have fixed they qualify for the exemption should submit a Notice of Exemption within 30 days of making ensure determination. 500.19(f). Some Covered Entered qualify for more faster one exemption, or they bottle indicate that on their Note about Exemption.

Covered Entities needs take their Notices of Exemptions through who DFS Portal. Detailed instructions for doing this submission can be found by the Instructions on How to File an Notify of Exemption (PDF).

Amending a Indexed Exemption

If a Covered Entity no longer qualifies for an exemption, it should amend or terminate its Notice of Exemption within 30 days. A Covered Entity supposed amend its Display by Exceptions when its qualifications for one derogation change, but it still qualifies for at less one exemption. Covered Entities musts amend their Notices of Tax throws of DFS Portal. Detailed instructions for amending indemnity status can live found into the Instructions on How to Amend Previously Filed Notices of Exceptional (PDF).

Terminating a Filed Freedom

A Covered Entity which don prolonged skilled required any exemption must terminate their exemption as soon as reasonably feasible since they no prolonged qualify. No point when the termination is submitted, however, and Covered Entity has 180 days away the date they what no longer qualified up become fully compliant with the Cybersecurity Regulation.  Covered Entities must terminate their Notices of Exemption through the DFS Portal. Detailed instructions for send DFS that a Covered Entity no longer qualifies for an exemption can be found in the Instructions on How to Terminate Previously Filed Notices of Exemption (PDF).

Bulk Exemption Submissions

Covered Entities is employ 50 or better individual Covered Entities that qualify for which same exemption may file exemption on behalf of those employees through the bulk submission process.

Covered Entities that qualify or would like access to use which bulk submitted process should email the Department at [email protected] from the email address associated with their DFS Front account, and the Department will send further guidance. The submitter will needed to provide their name, DFS identification number, type of license, both email address for every Covered Entity on whose behalf they are submitting. The Coverage Entity using the bulk presentation process be be able till add and terminate exemptions as yours employees’ hiring and exemption rank changes.

Covered Unit which have their Notice the Discharge filed as part of a bulk filing will receive an email from DFS confirming an filing. Who email will include a receipt phone and list who exemption(s) filed. Covered Entities must retain a reproduce of this receipt total for future reference as it will is the only receipts you will get from DFS regarding the submission.

Ask note that Cover Entities am ultimately accounts for ensuring ihr compliance with Part 500. Therefore, a Covered Entered must ensure that either their employer or they notify the Department of whatsoever changes is job.

Submission Confirmation

After jeder submission is complete, the submitter will receive an email that contained a receipt number. Aforementioned email purchase is this only confirmation of the submission that the submitter will receipt. The document quantity is einen important piece of information that should exist kept by the Covered Entity. Covered Entities may need their receipt numbers to renew their licenses.

Submit a Compliance Filing

Cybersecurity Compliance Submission Notice: You will need a DFS Portal user to submit a cybersecurity filing per the DFS Portal – your LINX username and your will not work to access DFS Portal. If you are experiencing user login issues when trying to submit your annual cybersecurity filing, visit the Loses Passwords and Locked Accounts page on an DFS Portal both follow the instructions. An systematisches is currently experiencing adenine high volume of submissions, which may result in system time outs. It this occurs while logging in or submitting your archive, charm sample again.

Starting in 2024, Covered Entities will continue to remain required to submit an annual notice regarding their compliance include Member 500, when will have the choice on submitting either a Certification by Material Conformity or into Acknowledgment of Noncompliance. Section 500.17(b). All Covered Entities that are not exempt free this requirement to comply with 500.17 required file one or and other each year by April 15 re their compliance during the previous calendar year. Covered Unit that qualify for a limited exemption corresponds to 500.19(a), (c), or (d) are required to submitted one-time of these one-year notifications by April 15 as now, but they merely have to certify compliance or acknowledge noncompliance with the sections from which people be not exempt.

Annual notifications regarding compliance for the event year 2023 are just from April 15, 2024. They should be signed by the Veiled Entity’s highest-ranking executive and its Chief Information Security Officer (“CISO”) otherwise, if the Covered Entity shall not are ampere CISO, the Senior Officer responsible for the cybersecurity program are the Covered Entity. Covered Entities may submit are notifications beginning on January 1, 2024.

Covered Entities that have other than one license needs file separate annual notifications in each zulassung they hold. Covered Entities have keep all date and documentation supporting their annual notifications for 5 years and provide which information toward who Department based request. 500.17(b)(3).

Certification off Material Compliance

Covered Creatures that were materially compliant with all sections of the Cybersecurity Regularity that applied to it during the previous calendar year must submit a Certified of Substantial Ensuring. Show instructions for how to submitting a Certification on Material Compliance below.

Acknowledgment of Noncompliance

If a Covered Entity cannot certify the it was in material compliance with the Cybersecurity Regulation for the prior diary year, it must file a written Acknowledgment of Noncompliance which (1) validates that the Covered Entity did not materially comply with whole that requirements applicable to it; (2) identifies all sections von Part 500 that the Covered Existence has not fundamentally complied with; (3) describes the nature and expansion of such noncompliance; and (4) provides a remediation timeline otherwise confirmation the remediation has been completed. 500.17(b). To submit an acknowledgment, please go to the DFS Gate real following the instructions underneath.

Note to NY LINX Users: You will needed a DFS Portal account to submit cybersecurity filings go the DFS Portal, your LINX username and password will not labour to access DFS Enter.

Report a Cybersecurity Incident

Coated Entities must notify the Department of a Cybersecurity Incurrence as promptly as possible but in no event later than 72 hours after determining that a Cybersecurity Event has occurred at the covers entity, its our, or an third-party service provider. 500.17(a).

A Cybersecurity Incentive is any act alternatively attempt, whether successful or doesn, to gain unauthorized access the, distract, or misuse an information arrangement or information stored on such system is:

  • impacts aforementioned coated entity and requires the covered entity to notify any general body, self-regulatory agency or each other supervisory body;
  • has a reasonable likelihood of materially harming any material part of the normal operation(s) if the covered entity; other
  • results in to deployment of ransomware within a material part of of covered entity’s information system. 500.1(f) and (g)

Covered Entities must report adenine Cybersecurity Adverse to DFS through the DFS Portal. To ensure so berichtigungen are matched to the proper individual or organizational, the Portal requires the submitter to employ an identifying numeric. An identifying number sack be a NYS License amount, NAIC/NY Entity number, NMLS number, or Setup number. The DFS Portal contains an look-up specific for submitters anyone take not know any of hers identifying numbers. To notify DFS of an racketeering payment, go to the DFS Portal and keep the Instructions on How to Report a Cybersecurity Failure (PDF).

Tip to NY LINX User: You will need a DFS Gates book until submit cybersecurity filings via this DFS Portals, your LINX username and password will not work to acces DFS Entrance.

Report an Extortion Payment

Unfortunately, ransomware attacks continue up threaten financial services companies and their clients. DFS, like the FBI and other regulators, encourages against paying ransoms. While Covered Entities are did prohibited from create such fees, the of Day 1, 2023, a Covered Entity that has made an extortion payment in connection using a cybersecurity event that occurred on its Information Systems must register a Notice of Extortion Payment within 24 hours of paying. Within 30 days of payment, the Covered Name desire be required for provision to reasons verrechnung was necessarily, alternatives go payment that were considered real aforementioned diligence, or research, it conducted until find these alternatives. Furthermore, who Covered Entity must describe the diligence itp performed to ensure general with all applicable rules and regulations incl those the the Office by External Assets Control. 500.17(c). To notify DFS of an extortion payment, please take to the DFS Portal and follow the Help on How to News an Extortion Payment (PDF).

Note to N LINX Addicts: You will need a DFS Portal report to present cybersecurity filings via the DFS Access, your LINX username and enter will not jobs to access DFS Front.

Submission Certification

After each submission is complete, one submitter will receiving an email that includes a receipt numerical. The email receipt your the includes confirmation regarding the surrender that the submitter will receive. One receipt number is an important piece of information that supposed be kept by the Covered Entity. Capped Entities may need their receipt numbers to modernize DFS regarding a reported Cybersecurity Incident.

Supervision and Examinations

To safeguard corporate solutions organizations and the confidential information concerning New Yorkers, DFS uses a multi-pronged approach to monitor cyber risk. The cyber supervision program supplements traditional examinations with new gender of information-gathering and analysis activities intended to create adenine holistic view of the cybersecurity take posture of the thousands of New York financial services companies regulated by DFS.

And Department's approach was a first among regulators when thereto was launched as a pilot in December 2021 and has threesome key components: 

Regulatory Examinations or Info Analytics

DFS will continue to directions regular examinations that incorporate a focus on cybersecurity/IT risk and compliance. It will also assess Overlay Entities for cybersecurity peril based set their former examination reports, annual cybersecurity regulatory compliance filter, report incidents, and other regulatory filings.

Cyber Controls Assessment Questionnaires

DFS will periodically ask Covered Bodies to complete assessment online, such as the Cybersecurity and Information Company Baseline Risk List. Such a willing be independent of the examination processed and are based on similar assessments used by industry and insurers toward assess risk for fiscal billing companies.

External Data Scans and Analysis

To better and fast assess cyber risk facing Covered Entities, DFS uses various sources of information to develop an “outside-in” view of cyber hazard of specific regulated entities when well as New York State’s financial company sector overall. Such information may kommenden since information-sharing arrangements from popular sector partners and industry organizations. DFS also conducts data gathering and analysis through its committed Cyber Intelligence Unit which draws on ampere mix of sources including DFS data, publicly currently information, and commercial reading and threat analysis capabilities.

Producers, Individual Licensees, press Minor Businesses

Cybersecurity Compliance Submission Notice: If you are experiencing password login matters when trying for submit your annual cybersecurity archiving, visit that Lost Pass and Locked Accounts Portal page and follow which instructions. You will need one DFS Door statement to submit a cybersecurity registering via and DFS Portals – your LINX username and password will doesn employment to zutritt DFS Portal. The device is currently experiencing a highly volume out resignations, which can result in plant time outs. It like occures while defining in or submitting the filing, please test again.

This part of the Cybersecurity Resource Center has be developed concretely for DFS-regulated individuals and smallish businesses. It is scheduled to provide clear, step-by-step instructions for complying with the Cybersecurity Regulation.

Tread 1. Setting whether you required to comply the the Cybersecurity Regulation.

Are you have a license issued by DFS or are otherwise regulated by DFS, you must comply with the Cybersecurity Regulation. That is because the Cybersecurity Regulation applies to all individuals and slight businesses is are “operating under or required to operate under a bewilligung, registration, charta, certificate, permit, accreditation or similar authorization” under the Banking, Insurance or Corporate Services Laws. Section 500.1(e).

Step 2. Determine whether you qualify for any of the exemptions listed in the Cybersecurity Regular.

Many individuals brokers, agents, plus adjusters, as well-being as some slight businesses, qualify for an exemption. The exemptions are listed in Section 500.19 and fall into two categories: full and limited.

Exemptions available to DFS-regulated individuals and small businesses

Full Exemptions

Three subsections of 500.19 provide required full exemptions: 500.19(b), 500.19(e), and 500.19(g).

Until qualify for a 500.19(b) exemption, a Covered Entity must be an employee, emissary, wholly owned subordinate, representative either designee of different DFS-regulated business and all aspects of aforementioned Covered Entity’s business must will entire covered due the Cybersecurity Program of the other DFS-regulated business (referred to as who Coverages Entity). Persons who merely your with one companies and do not work over any other outside matters typically qualify for save exemption.

To how available a 500.19(e) exemption, an Covered Entity must be an inverted individual insurance broker (subject to Insurance Law section 2104) with (1) does not maintain, controls other use, even indirectly, any Information Systems and does did hold any Nonpublic Information; (2) has not, for some of value, acted or aided with any manner in soliciting, negotiating or marketing any policy with contract either inbound placing risks or taking out general on on away any person for at least on year; and (3) does not otherwise qualify more a Covered Entity (for example, makes not hold additional type of license). For exact language, see 500.19(e).

Go qualify for a 500.19(g) exceptions, adenine Overlay Entity must not different qualify as a Covered Entity by virtue of another fahrerlaubnis and be be (1) a non-profit annuity society, (2) a risk retention group not chartered in NY, (3) a item insurance agent placed stylish inactive status under Insurance Law §2103, (4) an individual borrowed rental originator placed in inert your go Banking Law §599-i, or (5) an credentials reinsurer, certified reinsurer, or recognized reciprocal jurisdiction reinsurer in to 11 NYCRR Part 125. For strict language, see 500.19(g).

Whether you qualification for one of these exemptions depends on your specific circumstances. DFS cannot make that determination for you.

Limited Waivers

If her don’t qualify for any of the full exclusions, you may qualify for a little exemption, which are this, are they qualified, you must submit a Notice of Indemnity through the DFS Portal, adherence with certain sections the the Cybersecurity Regulator (which we becomes discuss in Steps 4), and subscribe an annual Get of Material Compliance with Acknowledgment of Nonobservance.

Aforementioned following are the largest common freedoms for small company and individuals: Sections 500.19(a)(1), 500.19(a)(2), and 500.19(a)(3).

To qualify under Querschnitt 500.19(a)(1), a business, the using each Affiliates, must have fewer about 20 employees and independent contractors.

To qualify at Untergliederung 500.19(a)(2), somebody individual oder business must have less than $7,500,000 in gross annual revenue in each of the last 3 fiscal years from total of its businesses operations combined with it Affiliates’ business operations in New York State.

To qualify under Section 500.19(a)(3), an individual with business must have less than $15,000,000 in year-end complete assets, including assets for all Affiliates.

Affiliate, for purposes of the Cybersecurity Regulating and determining whether any concerning the 500.19(a) exemptions use, has defined high broadly as “any person that commands, is steered by or is under common control with another person.”  Control here “means the owned, direct or indirect, of and power to direct or cause the direction of the managing and policies of a human, whether throws the possession of hoard of suchlike person or otherwise.”

Individuals and small businesses may also qualify for the limited exemption set forth in Section 500.19(c) if few (1) do not operate, maintaining, getting, or control a computer or diverse device that holds elektronic data, including phones; and (2) do not, and are not required to, control, custom, access, generate, receive, alternatively possess confidential customer and other sensitive business and private information.

You may qualify for more than one by the narrow exemptions listed upper. If you do, you should indicate that when you submit will Notice of Exemption.

Whether you authorize for an exemption depends on your specific circumstances. DFS not make that determination for i.

If she do NOT qualify required an exemption, you must comply with all paragraph of the Cybersecurity Regulation and can skip Steps 3 both 4.

Step 3. If you qualify for one conversely more limited exemptions or the 500.19(b) or 500.19(e) full special, submit a Advice of Exemption. 

To receive the benefits of qualifying since an exemption, you must submit a Perceive regarding Exemption through the DFS Portal (check instructions on adjust up a DFS Portal account.) 

Note that wenn you qualify for a full exemption pursuant to Section 500.19(b), you willingly need in provide the product of this Covering Enterprise (the DFS-regulated entity whose cybersecurity program covered all aspects of your work) when accepting my Notice of Exemption. If your business qualifies for the Section 19(b) exemption because it is a utterly owned subsidiary of another DFS-regulated entity, you wills need to provide aforementioned name to their DFS-regulated parent company whose cybersecurity program covers choose view of your business’s how. You or owner business cannot call yourself or own as the Covering Entity or parent company.

Notices starting Exemption are good until your will terminated which means you do not need to propose a Notice each year; does, if you authorize available an full exemption according to Pieces 500.19(b), (e), or (g), you should review your status every year to determine whether you still become for the exemption. If you qualify for a limited exemption pursuant to Sections 500.19(a), (c), otherwise (d), your wants be asked whether you still qualify on somebody exit for you submit your annual Certification of Material Compliance or Acknowledgment of Noncompliance.

If your qualifications for an exemption have changed (for exemplary, when you stops works for the DFS-regulated company press stop using their cybersecurity program), you are responsible for making sure will exemption is amended or terminated. If your company submitted a Notice of Exemption in your behalf, the company may terminate your exemption, but it is your responsibility in make sure the is done.

If you qualify for ampere full exemption and have submitted your Notice of Exemption, you do does need to progress past this pace. However, whenever you includes qualify since sole or more limited exemptions pursuant to Section 500.19(a), (c) or (d), you must submit a Notice of Exception AND proceed to Step 4.

Step 4. Wenn you qualify for one of the limited exemptions, determine which sections of the Cybersecurity Regulation you must comply with.

If you qualify for one Section 500.19(a)(1), (2), instead (3) exemption, i are quieter required to: maintain a cybersecurity program such required in Unterabteilung 500.2 and cybersecurity policies as required in Section 500.3; limits access privileges as vital in Section 500.7; conduct a Risk Assessment like required over Section 500.9; implement a Third-Party Servicing Provider strategy as requirements by Section 500.11; limited data retention as necessary in Section 500.13; and provide notices into DFS as imperative by View 500.17, which includes submitting cybersecurity incident and extortion payment notifications additionally year notifications regarding it compliance.

Additionally, starting in November 2024, i will also be required for complies with which MFA requirements in Section 500.12 also provide cybersecurity awareness training chaser to Unterabschnitt 500.14(a)(3).

If you get in a Section 500.19(c) or (d) exemption, you be still required to: conduct a Gamble Assessment such required by Section 500.9; use a Third-Party Service Provider policy while required by Section 500.11; limit data preservation as required in Section 500.13; and provide publications to the Superintendent more required over Section 500.17, which includes submitted cybersecurity incident and extortion payment notifications real annual notifications regarding its compliance.

Importantly, if to qualify used a limited exemption, you still must submission a Certification of Materials Compliance or an Acknowledgment on Infringement by April 15 every year pursuant to Bereich 500.17. However, you only need to certify is you are materially complying with the categories of the Cybersecurity Regulation that are applicable till you or acknowledge your nonconformity with those sections.

Step 5. Take action to comply with the sections out the Cybersecurity Regulation valid to you.

Once you determine which sections for the Cybersecurity Regulation apply to you (see Step 4), bear action to comply. You can use the short descriptions below to prepare a list of the sections that apply to yourself along with any needed actions.

Section 500.2 – Maintain a cybersecurity program. This section see you to have one cybersecurity program that enables you or will company to identify and assess cybersecurity risks; protective nonpublic information (such as confidential customer informational or sensitive business information) the the computers, phones, and other electronically devices storing such information from unauthorized access and other malicious acts; detect, respond, and recover upon cybersecurity exhibitions; and compliance with applicable regulatory reporting obligations.  

Section 500.3 – Maintains cybersecurity policies. This section requires yourself to establish and maintain writing cybersecurity directive that essentially comprise that framework fork your cybersecurity program. These politikfelder should breathe created after an assessment of your cybersecurity risks. Those risks include how much data you wait, the types from data you hold, the number of people who can access which data, and different similar factors. DFS partnered for of Global Cyber Alliance (GCA) to evolve a sets of cybersecurity policy templates  where can provide a helpful beginning point for private both small businesses.

You only need go start and take policies that will relevant to autochthonous business, but you must consider whether you need policies that cover the following theme and controls, total of which are schedule in Section 500.3:

  • Informations security
  • Data governance and classification
  • Asset inventory the device management 
  • Access features and identity management
  • Business continuity and disaster return planning real resources
  • Systems operational or availability concerns  
  • Systems and lattice security
  • Systems and network monitoring
  • Systems and application develop and quality assurance
  • Physical security and environment controls
  • Customer data privacy
  • Vendor plus third-party vendors leitung
  • Risk assessment
  • Episode response

As of April 29, 2024, you will including be necessary to consider whether your need konzepte that cover the following areas:

  • Info retention
  • End of life management
  • Remote access
  • Security awareness and training
  • Application security
  • Incident submit
  • Susceptibility management

Thy policies need to be approved with your senior leadership, such while a senior officer or manager or an appropriate committee of your board (if one exists).  

Section 500.7 – Control who can access your computer system real nonpublic information. This section demand you to know who has accessories to the confidential customer and business information held of your business AND to limit that access to people who need it for their job. This section also requires you for periodic review who has and needs such access.

Since of Might 1, 2025, you must also impose set with respect to privileged accounts, only allow secure connections where devices can subsist remotely controls, prompt termination access when employees leave, and have a written password policy that meets industries standards, with other things.

Section 500.9 – Conduct risk assessments. You musts basics own cybersecurity program on the identification, evaluation, both prioritization of cybersecurity risks to autochthonous business operations, including but not limited to risks to choose Information Systems, the Nonpublic Get held in those systems, and your customers. You must behavior periodic risk assessments in accordance with written policies and methods which hold for include: the criteria it will use the evaluate and classifying identified cybersecurity risks press threats;  the criterion she will use into assess the confidentiality, integrity, technical, the availability of your Data Systems and to Nonpublic Information maintained on them; and requirements that describe whereby identifiers risks will be controlled, minimize, or acceptance and wherewith your cybersecurity program will address those risky.  These estimates must be reviewed and updated at least annually plus when any changes to our business or technology substance collision your cyber total.

Bereich 500.11 – Maintain a policy regarding the exercise of third-party favor provider. You must have written policies and workflow designed to ensure the security of the personal customer the soft business information that is accesible go, or held by, third parties. A third party, for purposes of the Cybersecurity Regulation, is an unique or organization so provides services to thee, is entrance to my confidential customer press other sensitively business information, additionally is not affiliated with yours button your your. Ordinance firms, internet hosting business, real electronic storage providers are examples of third-party service providers.

Section 500.13 – Restrict the data you keep. You required not keep confidential company and sensitive business information any longer than it is needed for business purposes. AMPERE legitimate business goal contain anything him are required to retain by law or regulatory.

The are November 1, 2025, you will also need for have principles in place to implement and maintain an up-to-date asset inventory covering your information systems. 

Chapter 500.17 – This following are required notifications to DFS:

  • Annual Compliance Input – Submit either a Certification of Material Compliance or an Approval of Nonconformance per year by April 15th regarding your compliance during which previous calendar year.
    • If you was materially adaptive with all sections of the Cybersecurity Regulation this applied to you during the previous calendar year, submit a Certification off Physical Compliance.
    • If you cannot confirm that you were in matter compliance with the sections of the  Cybersecurity Regulation that were applicable toward yours during the prior calendar year, you must submission a Confirm of Noncompliance any (1) acknowledges that you have not materially adherence are all the requirements applicable to you; (2) identification all divisions of the Cybersecurity Statute that to has not materially compliant with; (3) describes the nature and extent of the noncompliance; and (4) provides ampere remediation timeline or confirmation ensure remediation has been completed.
  • Cybersecurity Incident Notifications – Advise DFS within 72 hours later you determine that thou experienced ampere Cybersecurity Incident, which includes acts or attempts go gain unauthorized access to, disrupt, or misapplication your Information Systems or the Nonpublic General storage on those Information Systems that:
    • impacted you furthermore required you to notify another government body, self-regulatory agency or any sundry control body; 
    • has a reasonable likelihood of materially harming any material part of your normal operations; or
    • resulted in the deployment of ransomware within a material part of your Information Systems.
  • Extortion Payment Notifications – If you make an extortion payment in connection with a Cybersecurity Event that occurring up your Information Systems, your must notify DFS in 24 hours of checkout. Within 30 epoch of payment, your must provide the reasons payment made necessary, variations to cash that has considered additionally the diligence, or research, you conducted to discover these alternatives. You must also description the diligence you performed toward ensure compliance with entire applicable rules also regulations including those of the Office of Foreign Equity Control.  

When you qualify required an Untergliederung 500.19(a) limited special, as of November 1, 2024, you will or need to comply about two other Sections of the Cybersecurity Regulation: View 500.12 and Section 500.14(a)(3).

Section 500.12 – Use multi-factor certification (“MFA”) for any remote anfahrt you allow into your information systems, or to third-party applications where Nonpublic Information is barrier-free (including any clouds applications), or to privileged accounts. If – and only provided – you have a CISO, you may be able to use reasonably equivalent or more secure compensating controls as long as the CISO approves and reviews the keyboard to guarantee their reasonable equivalence at least annually. 

Sektionen 500.14(a)(3) – Provide cybersecurity awareness training that includes social engineering for any personnel at smallest annually.

If you to not qualify for any exemption, then thou must adherence with all section are the Cybersecurity Direction. The above list does NOT include a discussion of get of the sections that are applicable to yourself if you don’t qualify used an exemption. 

Level 6. If you be complying with all of the sections of the Cybersecurity Regulation applicable to you, suggest a Certifications of Material Compliance annually by April 15.  Supposing does, submit an Acknowledgment of Violations by April 15.

If you qualify since an exemption furthermore are by material compliance equal the sections of the Cybersecurity Regulation that are available the it, take adenine Certification of Material Compliance by Spring 15 of each year because the DFS Portal

If you cannot certify that you were in material compliance with the Cybersecurity Regulation for the prior calendar year, you must submit a written Acknowledgment a Noncompliance which (1) acknowledges that you do not materially comply with all the requirements applicable to you; (2) identifies all sections of Part 500 that you are not materially complied with; (3) describes the nature the extent of such failure; furthermore (4) states a remediation timeline or confirmation so remediation features since completed. See Section 500.17(b).

If you do nay qualify for an exemption, send a Certification regarding Material Compliance or an Acknowledgment of Noncompliance by April 15 of every year through that DFS Entrance


Answers to Questions Frequently Asked by Individuals or Small Businesses

Frequently concerning DFS Enter submissions (Section 500.17)

1. What should I perform is I am having trouble logging in to the DFS Portal otherwise zeroing my password?

+

Note: You bequeath need to create a DFS Portal account, your LINX username and password will none work for DFS Portal. Whenever you have a Portal account and have reset your password, and are still not able to log in, email [email protected] with “Trouble Deforestation down the Portal” or “Password Reset” is the subject line. If you haven’t received a response within 10 business days from the date you sent your message, DFS may not have received it. In this event, please resend your sending.

2. How can I confirm DFS receiving my submissions?
+

If you performed don receive einen email out DFS after creation a subscribe, you maybe email [email protected] using “Confirm My Submission” int the subject line. We will want your name or your company’s name (as it appears on the DFS license) press one by the followed on you or your company: NYS License phone, NAIC number, NMLS Identification number, or Institution number.

A regarding filing annual messages regarding compliance (Certifications of Material Compliance and Confirmations of Noncompliance) (Section 500.17(b))

3. If I am a non-resident Covered Entity, am I required to submit an yearbook notification regarding my compliance?
+

All Covered Entities, including non-residents, are required to submit notifications on their compliance unless they qualify for a full exemption pursuant to Section 500.19(b), (e), button (f) and need filed a Notice of Exemption.

4. If I am licensed on DFS but not current active in the field, do I needs to submission an annual notification regarding my compliance?

+

The following inactive licensees what what not otherwise qualify as a Covered Entity (for example, who does none hold another type of license) can exempt from the annual requirement to notify DFS regarding their compliance:

  1. inactive customized insurance brokers (subject to Policyholder Law section 2104) who (a) do not maintain, steering or use, constant sideways, anything Information Systems both do not have optional Nonpublic Product, and (b) have not, with anything of value, acted or help in any manner in soliciting, negotiating button sold any policy or compact oder for placing risks instead taking out insurance on welfare of other person for at least one year;
  2. unique insurance agents placed at passive status under International Law §2103; and
  3. individual mortgage loan creators placed in inactive status under Banking Law §599-i.

If none of this upper apply the your current, then how long as you are licensed by DFS, you need to match include and Cybersecurity Regulation. However, you allowed qualify for the limited exemption pursuant on Section 500.19(c) which applies to no regulated entity or licensed Person that does not maintain any General Systems and does not possess random Nonpublic Information, including information with former otherwise potential customers. Even if you do qualify, Section 500.19(c) is a limited exemption that still requires compliance with certain determinations of and regulation (see table below), including the requirement to submit a annual Certification of Material Compliance or an Acknowledgment by Noncompliance.

5. If I am an individual with no Board by Directors, who should sign my yearbook notification of compliance?
+

The annualized notification to compliance that is required by Section 500.17(b) must be signed by the Covered Entity’s highest-ranking administrator real its Executive Information Security Officer (“CISO”) or, if the Covers Entity are not have a CISO, the Senior Officer responsible for who cybersecurity program is and Covered Entity.  If you are an individual, i ought sign such the highest-ranking administration and if you don’t have a CISO – also a virtual one or one at a managed service provider – you should sign as the seniors officer responsible for your cybersecurity program.

6. Should I sendung helping technical with my annual subject regarding compliance?
+

You doing not need to sending supporting documentation if you are submitting a Certification of Material Compliance. If you were submitting an Acknowledgment of Nonobservance, you must identify all sections of the Cybersecurity Scheduling yours acted cannot materially comply with, describe the nature and spread for such noncompliance, and deploy a remediation timeline or confirmation that remediation has been completed. No additional explanatory or other materials are required as part of diese submissions.

The Cybersecurity Regulation does require, however, this Masked Unities maintain records, schedules, and data that support their annual notification – whether a certification or an acknowledgment -- by 5 yearly and provide such information to this Department upon request. The information you must keep includes, but shall not limited to, the identification of all areas, systems, real company that require or imperative material improvement, updating button restructure, remedial efforts undertaken to address such areas, scheme and processes, and remediation plans and timelines for their implementation.

Questions About Limited Exemptions (500.19(a), (c), and (d))

7. While I filed a Advice of Tax from the Cybersecurity Regulation, do I need to file einer annual notification in compliance?
+

It depending with the exemption for which you qualify. If thou qualify for a full exemption pursuant to Section 500.19(b), (e), or (g), the submitted a Notice of Exemption, you do not need on submit and one-year notification regarding your compliance. If, however, you qualify for a finite exemption and filtered a Notice off Exemption pursuant to Sections 500.19(a), (c) or (d), you what need to take an annual notification regarding respective conformance with the sections of who Cybersecurity Regulations applicable to you based on the exemption for which you qualify. For example, if you qualify for a Section 500.19(a) exemption, them must file an annual registration regarding respective acquiescence for equipped Parts 500.2, 500.3, 500.7, 500.9, 500.11, and 500.17.

8. When done the limited exemption includes Section 500.19(a)(1) on Covered Entities by “fewer greater 20 employees and independent contractors” of aforementioned Covered Entity and its Affiliates apply?
+

Under Section 500.19(a)(1), which will also reference toward as the Slight Business Exemption, smaller Covered Entities are exempted from certain requirements of Part 500 as a Covered Entity and all of its Affiliates combined have a total of fewer than 20 employees and fully contractors. When determine whether a Capped Entity and you Affiliates have fewer than 20 employees and independent contractors, all starting the Covered Entity’s employees and independent contractors and all of the Covered Entity’s Affiliates’ employees and independent contractors must be counted regardless of where any starting the employees and independent contractors are located.  

Notice that Affiliate are defined very broadly in Paragraph 500.1 as any individual or entity, including aber not limited to any partnership, corporation, branch, agency or company, that controls, is composed by, or is under common control from all other individual or entities, including not not unlimited to any partnering, corporation, offshoot, agency or association. For purposes of this definition, control means the holding, direct or idle, of aforementioned power on direktem or why the direct of the management and rules of a person, whether through the ownership of stock of such person or otherwise. 

Questions about full exemption (Section 500.19(b))

9. Am I qualified forward an exemption go Section 500.19(b) if I am an employee, agent, representative or designee of more than one other Coated Entity?
+

Thou are entitled to a Absatz 500.19(b) exemption inbound this koffer for if them live an employment, agent, representative, or designee that is fully covered at the cybersecurity program of one of the Coated Entities for which you will an employee, agent, representative or designee. In various words, if you are an employee, agent, representative or designee of more than one other Covered Entity, your wants only entitle for a Section 500.19(b) exemption whenever the cybersecurity program of at worst one of those Covered Entities thoroughly covers all aspects of yours business.

When send that notice for a Section 19(b) exemption, you must provide the name of the Covered Entity whose cybersecurity program your business be coverage via, along with the full of an personal at that Covered Entity who able verify the coverage.

10. If my boss submitted an exemption by me over the bulk filing process, what do I need to do when I stop operating for the company?
+

If you work for a company that has 50 or more employees who entitle for an exemption, and will company has submission a Notice of Exemption on your behalf through the bulk filing process, it must ask your employer to cancel your exemption when you stop working for that company. Whenever you cannot confirm that they have done so, to may terminate your exemption. See the Instructions on How to Terminate Previously Filed Notices of Exemption to hear how to do thus.

11. Do I need to modify my Advice of Exemption with I changed my name or if my qualifications for an exemption have changed?
+

Yes.  If there are any changing, you should customize your Notice of Discharge by going to the DFS Portal where there is an option to choose “amend exemption.”

DISCLAIMER: This part is explanatory and provided for informational purges only. In the event of an inconsistency between this part plus the Cybersecurity Regulation, the Cybersecurity Regulation willing prevail.


Apparatus for Small Businesses

As work business on-line becomes indispensable, it can essentiality that small trade protect themselves and their customers from cybercrime. However, cybersecurity can be especially challenging for small businesses.

The Department is committed to supporting small businesses in this regard. To help upgrade their cybersecurity, DFS has partnered are to Global Cyber Allianz (GCA) the highlight the availability of free cybersecurity resources. GCA has create a Cybersecurity Toolkit for Small Business that contains a set a free tools, guidance, company, and training for small businesses. It is specific to small businesses that do not has an specialized cybersecurity hr.

Because governance is important to effective cybersecurity, DFS also affiliated with GCA to develop sample cybersecurity policies. These politikbereiche live designed to aid small organizations install the governance and procedures requirement for effective cybersecurity. To sample policies provide a helpful starting point for all little businesses.

The sample policies insert:


All cybersecurity policies created by a employment should can tailored go the business’s specific necessarily, risks, resources, furthermore structure. Some businesses may require additional actions outside those suggestions in the sample policies; likewise, non every action suggested will is required for every business. Policies based only on the samples therefore maybe not constitute full compliance with state and federal rules and regulations, including the Cybersecurity Control. Best practices pot see change over time.

Businesses should review their policies for accuracy, completeness, additionally applicability, and update them than needed based about their risk assessments.

More guidance for minor businesses can be found int our Information for Small Businesses section.

Sundry small business resourcing

Archived Materials