Sec. 18. Based on the results of the risk assessment, a licensee shall do the following:
(1) Design its information security program to mitigate the identified risks, commensurate with:
(A) the licensee's size and complexity;
(B) the nature and scope of the licensee's activities; and
(C) the sensitivity of the nonpublic information in the licensee's control.
(2) Determine and implement appropriate security measures, which may include the following:
(A) Placing access controls on information systems, including controls to authenticate and permit only authorized individuals to have access to nonpublic information.
(B) Identifying and managing the data, personnel, devices, systems, and facilities that enable the licensee to achieve business purposes in accordance with their relative importance to business objectives and risk strategy.
(C) Restricting physical access to nonpublic information to authorized individuals only.
(D) Protecting by encryption or other appropriate means all nonpublic information while being transmitted over an external network and all nonpublic information stored on a laptop computer or other portable computing or storage device or media.
(E) Adopting secure development practices for in-house developed applications used by the licensee.
(F) Modifying information systems in accordance with the licensee's information security program.
(G) Using effective controls, which may include multi-factor authentication procedures for any employees accessing nonpublic information.
(H) Regularly testing and monitoring systems and procedures to detect actual and attempted attacks on, or intrusions into, information systems.
(I) Including audit trails within the information security program designed to detect and respond to a cybersecurity event and designed to reconstruct material financial transactions sufficient to support normal operations and obligations of the licensee.
(J) Implementing measures to protect against destruction, loss, or damage of nonpublic information due to environmental hazards, such as fire and water damage or other catastrophes or technological failures.
(K) Developing, implementing, and maintaining procedures for the secure disposal of nonpublic information in any format.
(3) Include cybersecurity risks in the licensee's enterprise risk management process.
(4) Stay informed regarding emerging threats or vulnerabilities.
(5) Use reasonable security measures when sharing information, relative to the character of the sharing and the type of information shared.
(6) Provide personnel with cybersecurity awareness training that is updated as necessary to reflect risks identified in the risk assessment.
As added by P.L.130-2020, SEC.10.
Structure Indiana Code
Article 2. Powers and Duties of Insurers
Chapter 27. Insurance Data Security
27-2-27-1. Applicability of Chapter
27-2-27-2. "Authorized Individual"
27-2-27-5. "Cybersecurity Event"
27-2-27-8. "Information Security Program"
27-2-27-9. "Information System"
27-2-27-11. "Multi-Factor Authentication"
27-2-27-12. "Nonpublic Information"
27-2-27-13. "Publicly Available Information"
27-2-27-15. "Third Party Service Provider"
27-2-27-16. Information Security Program; Requirements
27-2-27-17. Risk Assessment; Requirements
27-2-27-18. Actions Required Based on Risk Assessment Results
27-2-27-19. Board of Directors; Executive Management
27-2-27-20. Incident Response Plan
27-2-27-21. Investigation of Cybersecurity Event
27-2-27-22. Notice to Ceding Insurers and Commissioner of Cybersecurity Event
27-2-27-23. Notice to Producers of Cybersecurity Event
27-2-27-24. Powers of Commissioner
27-2-27-26. Exemptions From Chapter
27-2-27-27. Suspension; Revocation
27-2-27-29. Private Right of Action