State Requirements Translated Into Proof

STATE CYBER & BREACH REQUIREMENTS

See What Each State Expects, and What Proof to Keep Ready

Select a state to see:

  • Breach notification basics
  • Insurance-specific cybersecurity requirements where they apply
  • Federal requirements, including FTC Safeguards / GLBA
  • The evidence you should be able to produce on demand

Use the state summary to confirm timing, who must be notified, any industry-specific requirements, and the proof a reviewer will expect.

Not legal advice. Use this to scope work and keep records, then confirm specifics with counsel.

Select Your State

One core program can support work across multiple states. Select each state where you operate to map deadlines, notice thresholds, recipients, and any industry-specific requirements into one evidence set.

Optional: Filter by Industry

This filter only changes what is shown below. It does not change what firms are obligated to do.

Interactive map
State-specific insurance cybersecurity statutes NAIC model-law baseline states Related insurance activity

Use Tab to focus a state. Press Enter or Space to select it. You can also select a state from the searchable list below.

NAIC model-law baseline states
State-specific insurance cybersecurity statutes
No dedicated insurance cybersecurity statute

The map highlights insurance cybersecurity overlays. Breach notification laws apply in every state; exact timing, recipients, thresholds, and insurance classifications still vary by jurisdiction.

* Puerto Rico: Puerto Rico appears in the adopted category on the NAIC Model 668 map dated March 3, 2026. Because Borealis presents a 50-state table and the Summer 2025 NAIC state page still showed Puerto Rico under related activity, Borealis tracks Puerto Rico separately instead of folding it into the 50-state list.

State Summary

Select a state on the map (or from the list) to see:

  • What applies to everyone (breach notification and baseline expectations)
  • Industry overlays (insurance / tax & accounting)
  • The evidence artifacts you should keep ready
AL NAIC 668

Alabama

Alabama Insurance Data Security Act

NAIC 668-style insurance requirements mapped to actions and evidence.

AK SB 134

Alaska

Alaska Insurance Data Security Act

State-specific insurance cybersecurity requirements mapped to actions and evidence.

AZ Related

Arizona

Related insurance activity (not Model 668 adoption)

Related insurance authority exists, but this is not treated here as a current Model 668 adoption. Confirm applicability with counsel and the DOI.

AR Baseline

Arkansas

Borealis baseline for regulated firms

No dedicated insurance cybersecurity statute. General security, vendor, MFA, and incident expectations still apply.

CA Related

California

Related insurance activity (not Model 668 adoption)

Related insurance authority exists, but this is not treated here as a current Model 668 adoption. Confirm applicability with counsel and the DOI.

CO Related

Colorado

Related insurance activity (not Model 668 adoption)

Related insurance authority exists, but this is not treated here as a current Model 668 adoption. Confirm applicability with counsel and the DOI.

CT NAIC 668

Connecticut

Connecticut Insurance Data Security Law

NAIC 668-style insurance requirements mapped to actions and evidence.

DE Ch. 86

Delaware

Delaware Insurance Data Security Act

NAIC 668-style insurance requirements mapped to actions and evidence.

FL Baseline

Florida

Borealis baseline for regulated firms

No dedicated insurance cybersecurity statute. General security, vendor, MFA, and incident expectations still apply.

GA Baseline

Georgia

Borealis baseline for regulated firms

No dedicated insurance cybersecurity statute. General security, vendor, MFA, and incident expectations still apply.

HI NAIC 668

Hawaii

Hawaii Insurance Data Security Act

NAIC 668-style insurance requirements mapped to actions and evidence.

ID Baseline

Idaho

Borealis baseline for regulated firms

No dedicated insurance cybersecurity statute. General security, vendor, MFA, and incident expectations still apply.

IL NAIC 668

Illinois

Illinois Insurance Data Security Law

NAIC 668-style insurance requirements mapped to actions and evidence.

IN NAIC 668

Indiana

Indiana Insurance Data Security Act

NAIC 668-style insurance requirements mapped to actions and evidence.

IA Ch. 507F

Iowa

Iowa Insurance Data Security Act

NAIC 668-style insurance requirements mapped to actions and evidence.

KS Baseline

Kansas

Borealis baseline for regulated firms

No dedicated insurance cybersecurity statute. General security, vendor, MFA, and incident expectations still apply.

KY NAIC 668

Kentucky

Kentucky Insurance Data Security Act

NAIC 668-style insurance requirements mapped to actions and evidence.

LA NAIC 668

Louisiana

Louisiana Insurance Data Security Law

NAIC 668-style insurance requirements mapped to actions and evidence.

ME NAIC 668

Maine

Maine Insurance Data Security Act

NAIC 668-style insurance requirements mapped to actions and evidence.

MD NAIC 668

Maryland

Maryland Insurance Data Security Act

NAIC 668-style insurance requirements mapped to actions and evidence.

MA Baseline

Massachusetts

Borealis baseline for regulated firms

No dedicated insurance cybersecurity statute. General security, vendor, MFA, and incident expectations still apply.

MI NAIC 668

Michigan

Michigan Data Security in the Insurance Sector Act

NAIC 668-style insurance requirements mapped to actions and evidence.

MN NAIC 668

Minnesota

Minnesota Insurance Data Security Model Law

NAIC 668-style insurance requirements mapped to actions and evidence.

MS NAIC 668

Mississippi

Mississippi Insurance Data Security Law

NAIC 668-style insurance requirements mapped to actions and evidence.

MO NAIC 668

Missouri

Missouri Insurance Data Security Act

NAIC 668-style insurance requirements mapped to actions and evidence.

MT Related

Montana

Related insurance activity (not Model 668 adoption)

Related insurance authority exists, but this is not treated here as a current Model 668 adoption. Confirm applicability with counsel and the DOI.

NE Related

Nebraska

Related insurance activity (not Model 668 adoption)

Related insurance authority exists, but this is not treated here as a current Model 668 adoption. Confirm applicability with counsel and the DOI.

NV Baseline

Nevada

Borealis baseline for regulated firms

No dedicated insurance cybersecurity statute. General security, vendor, MFA, and incident expectations still apply.

NH NAIC 668

New Hampshire

New Hampshire Insurance Data Security Law

NAIC 668-style insurance requirements mapped to actions and evidence.

NJ Related

New Jersey

Related insurance activity (not Model 668 adoption)

Related insurance authority exists, but this is not treated here as a current Model 668 adoption. Confirm applicability with counsel and the DOI.

NM Related

New Mexico

Related insurance activity (not Model 668 adoption)

Related insurance authority exists, but this is not treated here as a current Model 668 adoption. Confirm applicability with counsel and the DOI.

NY NYDFS

New York

NYDFS Cybersecurity Regulation

State-specific insurance cybersecurity requirements mapped to actions and evidence.

NC Related

North Carolina

Related insurance activity (not Model 668 adoption)

Related insurance authority exists, but this is not treated here as a current Model 668 adoption. Confirm applicability with counsel and the DOI.

ND NAIC 668

North Dakota

North Dakota Insurance Data Security Act

NAIC 668-style insurance requirements mapped to actions and evidence.

OH NAIC 668

Ohio

Ohio Data Protection Act (Insurance)

NAIC 668-style insurance requirements mapped to actions and evidence.

OK NAIC 668

Oklahoma

Oklahoma Insurance Data Security Act

NAIC 668-style insurance requirements mapped to actions and evidence.

OR Related

Oregon

Related insurance activity (not Model 668 adoption)

Related insurance authority exists, but this is not treated here as a current Model 668 adoption. Confirm applicability with counsel and the DOI.

PA NAIC 668

Pennsylvania

Pennsylvania Insurance Data Security Act

NAIC 668-style insurance requirements mapped to actions and evidence.

RI NAIC 668

Rhode Island

Rhode Island Insurance Data Security Act

NAIC 668-style insurance requirements mapped to actions and evidence.

SC NAIC 668

South Carolina

South Carolina Insurance Data Security Act

NAIC 668-style insurance requirements mapped to actions and evidence.

SD Related

South Dakota

Related insurance activity (not Model 668 adoption)

Related insurance authority exists, but this is not treated here as a current Model 668 adoption. Confirm applicability with counsel and the DOI.

TN NAIC 668

Tennessee

Tennessee Insurance Data Security Law

NAIC 668-style insurance requirements mapped to actions and evidence.

TX Baseline

Texas

Borealis baseline for regulated firms

No dedicated insurance cybersecurity statute. General security, vendor, MFA, and incident expectations still apply.

UT Related

Utah

Related insurance activity (not Model 668 adoption)

Related insurance authority exists, but this is not treated here as a current Model 668 adoption. Confirm applicability with counsel and the DOI.

VT NAIC 668

Vermont

Vermont Insurance Data Security Law

NAIC 668-style insurance requirements mapped to actions and evidence.

VA NAIC 668

Virginia

Virginia Insurance Data Security Act

NAIC 668-style insurance requirements mapped to actions and evidence.

WA Baseline

Washington

Borealis baseline for regulated firms

No dedicated insurance cybersecurity statute. General security, vendor, MFA, and incident expectations still apply.

WV Related

West Virginia

Related insurance activity (not Model 668 adoption)

Related insurance authority exists, but this is not treated here as a current Model 668 adoption. Confirm applicability with counsel and the DOI.

WI NAIC 668

Wisconsin

Wisconsin Insurance Data Security Act

NAIC 668-style insurance requirements mapped to actions and evidence.

WY Related

Wyoming

Related insurance activity (not Model 668 adoption)

Related insurance authority exists, but this is not treated here as a current Model 668 adoption. Confirm applicability with counsel and the DOI.

Program Review

Work Through State Requirements With Borealis

Use the state summary to frame the work, then book a short program review to map deadlines, reviewer expectations, and next actions with us.

Breach Notification Review

Walk through timing, recipients, thresholds, and the decisions to document before notices go out.

Book a review call

Incident Readiness Review

Pressure-test the first 72 hours, ownership decisions, and evidence handling before an incident happens.

Book a review call

Reviewer Evidence Review

Walk through the control crosswalk and the evidence reviewers usually expect to see.

Book a review call

Not legal advice. Borealis does not provide standalone download packs; we review your situation with you.

Ready to Map Your Requirements?

Get a prioritized review plan: what you have, what’s missing, and what evidence to organize next. Then book a short program review to confirm scope, state deltas, and what to prep for audit, renewal, and diligence requests.

Educational guidance, not legal advice. Always confirm requirements with your counsel and relevant regulators.