Utah Administrative Code
The Utah Administrative Code is the body of all effective administrative rules as compiled and organized by the Division of Administrative Rules (see Subsection 63G-3-102(5); see also Sections 63G-3-701 and 702).
NOTE: For a list of rules that have been made effective since July 1, 2015, please see the codification segue page.
NOTE TO RULEFILING AGENCIES: Use the RTF version for submitting rule changes.
R590. Insurance, Administration.
Rule R590-216. Standards for Safeguarding Customer Information.
As in effect on July 1, 2015
Table of Contents
- R590-216-1. Authority.
- R590-216-2. Purpose and Scope.
- R590-216-3. Definitions.
- R590-216-4. Information Security Program.
- R590-216-5. Objectives of Information Security Program.
- R590-216-6. Examples of Methods of Development and Implementation.
- R590-216-7. Determined Violation.
- R590-216-8. Enforcement Date.
- Date of Enactment or Last Substantive Amendment
- Notice of Continuation
- Authorizing, Implemented, or Interpreted Law
This rule is promulgated pursuant to Subsections 31A-2-202(1), 31A-2-201(2) and 31A-2-201(3)(a) in which the commissioner is empowered to administer and enforce Title 31A, to perform duties imposed by Title 31A and to make administrative rules to implement the provisions of Title 31A. Furthermore, Title V, Section 505 (15 United States Code (U.S.C.) 6805)) empowers the Utah Insurance Commissioner to enforce Subtitle A of Title V of the Gramm-Leach-Bliley Act of 1999(15 U.S.C. 6801 through 6820). Title V, Section 505 (15 U.S.C. 6805(b)(2)) authorizes the commissioner to issue rules to implement the requirements of Title V, Section 501(b)of the federal act. The commissioner is also authorized under Subsection 31A-23a-417(3) to adopt rules implementing the requirements of Title V, Section 501(b) of the federal act.
(1) This rule establishes standards applicable to the department's licensees to assist them in developing and implementing administrative, technical and physical safeguards to protect the security, confidentiality and integrity of customer information, pursuant to Sections 501, 505(b), and 507 of the Gramm-Leach-Bliley Act, codified at 15 U.S.C. 6801, 6805(b) and 6807.
(2) Section 501(a) provides that it is the policy of the Congress that each financial institution has an affirmative and continuing obligation to respect the privacy of its customers and to protect the security and confidentiality of those customers' nonpublic personal information. Section 501(b) requires the state insurance regulatory authorities to establish appropriate standards relating to administrative, technical and physical safeguards:
(a) to ensure the security and confidentiality of customer records and information;
(b) to protect against any anticipated threats or hazards to the security or integrity of such records; and
(c) to protect against unauthorized access to or use of records or information that could result in substantial harm or inconvenience to a customer.
(3) Under Section 505(b)(2) state insurance regulatory authorities are to implement the standards prescribed under Section 501(b) by rule with respect to persons engaged in providing insurance.
(4) Section 507 provides, among other things, that a state rule may afford persons greater privacy protections than those provided by Subtitle A of Title V of the Gramm-Leach-Bliley Act. This rule requires that the safeguards established pursuant to the rule shall apply to nonpublic personal information, including nonpublic personal financial information and nonpublic personal health information that licensees of the department obtain from their customers.
For purposes of this rule, the following definitions apply:
(1) "Customer" means a customer of the licensee as the term customer is defined in Rule R590-206, Privacy of Consumer Financial and Health Information Rule, Subsection 4(9).
(2) "Customer information" means nonpublic personal information as defined in Subsection R59-206-4(19) about a customer, whether in paper, electronic or other form, that is maintained by or on behalf of the licensee.
(3) "Customer information systems" means the electronic or physical methods used to access, collect, store, use, transmit, protect or dispose of customer information.
(4) "Licensee" means a licensee as that term is defined in Subsection R590-206-4(17)(a), except that "licensee" shall not include: a purchasing group; manufacturer or seller warranty provider and manufacturer or seller service contract provider exempted by R590-210, Privacy of Consumer Information Exemption for Manufacturer Warranties and Service Contract; or an unauthorized insurer in regard to the excess line business conducted pursuant to Section 31A-15-103.
(5) "Service provider" means a person that maintains, processes or otherwise is permitted access to customer information through its provision of services directly to the licensee.
Each licensee shall implement a comprehensive written information security program that includes administrative, technical and physical safeguards for the protection of customer information. The administrative, technical and physical safeguards included in the information security program shall be appropriate to the size and complexity of the licensee and the nature and scope of its activities.
A licensee's information security program shall be designed to:
(1) Ensure the security and confidentiality of customer information;
(2) Protect against any anticipated threats or hazards to the security or integrity of the information; and
(3) Protect against unauthorized access to or use of the information that could result in substantial harm or inconvenience to any customer.
The actions and procedures described in this section are examples of methods of implementation of the requirements of Sections 4 and 5 of this rule. These examples are non-exclusive illustrations of actions and procedures that licensees may adopt to implement Sections 4 and 5 of this rule.
(1) For risk assessment, the licensee may:
(a) identify reasonably foreseeable internal or external threats that could result in unauthorized disclosure, misuse, alteration or destruction of customer information or customer information systems;
(b) assess the likelihood and potential damage of these threats, taking into consideration the sensitivity of customer information; and
(c) assess the sufficiency of policies, procedures, customer information systems and other safeguards in place to control risks.
(2) For risk management and control, the licensee may:
(a) design its information security program to control the identified risks, commensurate with the sensitivity of the information, as well as the complexity and scope of the licensee's activities;
(b) train staff, as appropriate, to implement the licensee's information security program; and
(c) regularly test or otherwise regularly monitor the key controls, systems and procedures of the information security program. The frequency and nature of these tests or other monitoring practices are determined by the licensee's risk assessment.
(3) For service provider arrangement oversight, the licensee may:
(a) exercise appropriate due diligence in selecting its service providers; and
(b) require its service providers to implement appropriate measures designed to meet the objectives of this rule, and, where indicated by the licensee's risk assessment, takes appropriate steps to confirm that its service providers have satisfied these obligations.
(4) For program adjustment, the licensee may monitor, evaluate and adjust, as appropriate, the information security program in light of any relevant changes in technology, the sensitivity of its customer information, internal or external threats to information, and the licensee's own changing business arrangements, such as mergers and acquisitions, alliances and joint ventures, outsourcing arrangements and changes to customer information systems.
Violation of any provision of the rule will result in appropriate enforcement action by the department, which may include forfeiture, penalties, and revocation of license as provided in Section 31A-2-308.
The commissioner will begin enforcing the provisions of this rule 120 days from the effective date of the rule.
September 26, 2002
August 23, 2012
31A-2-201; 31A-2-202; 31A-23a-417; 15 U.S.C. 6801; 15 U.S.C. 6805; 15 U.S.C. 6807
For questions regarding the content or application of rules under Title R590, please contact the promulgating agency (Insurance, Administration). A list of agencies with links to their homepages is available at http://www.utah.gov/government/agencylist.html or from http://www.rules.utah.gov/contact/agencycontacts.htm.