Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

NY Revised Cybersecurity Regulation Goes Into Effect: What You Need to Know

By Katherine Lemire and Laura Ferguson
December 01, 2024

By Katherine Lemire and Laura Ferguson

On November 1, significant revisions to the regulations enforced by the New York Department of Financial Services (DFS) — the state’s financial services regulator — went into effect. The DFS revisions create a long-arm provision in that the changes affect not only New York State companies, but also their affiliates, and therefore the revisions could have an impact far beyond New York State borders.
DFS amended its cybersecurity regulations in November 2023, directly affecting New York State-regulated financial services companies, including insurers, crypto exchanges, mortgage servicers, foreign bank branches, money transmitters, student lenders, and fintech companies. The amended regulation, 23 NYCRR 500, often referred to as “Part 500,” has been touted by DFS as a first-of-its-kind regulation that aimed at improving institutional cybersecurity preparedness, response, and governance in New York’s financial services sector. Part 500 established various cybersecurity requirements for the so-defined “Covered Entity,” including maintenance of a cybersecurity program and designation of a qualified Chief Information Security Officer (CISO) overseeing the program; implementation of a written cybersecurity policy; regularly conducted vulnerability assessments; multi-factor authentication for external access to the company’s server; mandatory reporting of serious data breaches; and employee training.
Highlights of the changes to the DFS cybersecurity regulations include:

  • Stepped-up requirements for larger companies. Companies with at least $20 million in gross annual revenue and more than 2,000 employees will face additional regulatory burdens. These enhanced requirements include automated blocking of low-security passwords, independent audits, and monitoring of anomalous activity.
  • Expanded breach notification requirements. In the past, DFS required financial institutions to report cybersecurity incidents, such as security breaches, within 72 hours of occurrence. The revised regs now require such notifications not only for New York-regulated financial institutions but also for those institutions’ affiliates and third-party service providers.
  • Ransomware payments. Random payments paid in connection with cybersecurity breaches must be reported to DFS with a notice of the payment within 24 hours. Companies must also explain to DFS why the payment was necessary, and describe pre-payment diligence performed in search of alternative solutions to ransom payments.
  • Narrowing of small business exceptions. Historically DFS has exempted small businesses from some of the cybersecurity requirements, such as the definition of companies that qualify for small business exemptions has tightened. While the number of employees for qualified small businesses doubled from 10 to 20, the definition of “employees” now includes independent contractors and non-New York corporate affiliates. Similarly, while the amount of revenue allowable for the small business exception has grown from $5 million to $7.5 million in gross annual revenue in each of the last three years, “revenue” now includes revenue from all corporate affiliates, not just those located in New York. In addition to shrinking the pool of qualified small businesses, DFS has shortened the list of exceptions for those small businesses. For example, they are no longer exempt from multi-factor authentication requirements. In addition, companies are required to train all employees in cybersecurity awareness including social engineering, a method of cyber attack that seeks to coerce victims into divulging sensitive information by pretending to be a legitimate person or entity. In imposing these requirements on small businesses, DFS has put into practice a recognition that the vast majority of cyber attacks originate from social engineering, and that multi-factor authentication stands as one of the most cost-effective and dependable bulwarks against cyber criminals.
  • Expanded enforcement powers. The changes carry the potential to significantly expand DFS enforcement powers. The revisions make clear that a single act prohibited by the regulations amounts to a violation of Part 500. In other words, a single cyber breach exposing millions of consumers’ private data, such as dates of birth and Social Security numbers, technically could result in penalties of nine or ten figures (yes, billions, or tens of billions of dollars). To temper objections to such massive penalty exposure, the revised regulations require DFS to take into account factors that could serve to cap an otherwise exorbitant fine, including cooperation in the investigation, lack of intentional conduct leading to the breach, history of prior violations, and potential for consumer harm.


DFS cybersecurity regulations cover a broad array of industries, including insurance, banking, crypto, and more. To date, enforcement actions that have been brought against crypto exchanges, property insurers, and mortgage services, were among the first enforced by a U.S. regulator. Since their launch in 2017, federal and state regulators have followed the DFS model in drafting their own regulations. Businesses would be wise to review these DFS amendments as other regulators follow suit in the coming months and years.

This premium content is locked for Entertainment Law & Finance subscribers only

  • Stay current on the latest information, rulings, regulations, and trends
  • Includes practical, must-have information on copyrights, royalties, AI, and more
  • Tap into expert guidance from top entertainment lawyers and experts

For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473

Read These Next
'Huguenot LLC v. Megalith Capital Group Fund I, L.P.': A Tutorial On Contract Liability for Real Estate Purchasers Image

In June 2024, the First Department decided Huguenot LLC v. Megalith Capital Group Fund I, L.P., which resolved a question of liability for a group of condominium apartment buyers and in so doing, touched on a wide range of issues about how contracts can obligate purchasers of real property.

How Secure Is the AI System Your Law Firm Is Using? Image

In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.

The Power of Your Inner Circle: Turning Friends and Social Contacts Into Business Allies Image

Practical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.

Issues in Reverse Morals Clauses In Talent Influencer Contracts With Product Brands Image

The next company general counsel to slide a morality clause across the desk for a celebrity or web influencer to sign shouldn't be surprised if that talent also whips out a morals clause, one to cancel the contract if the company's brand acts immorally.

Pleading Importation: ITC Decisions Highlight Need for Adequate Evidentiary Support Image

The International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.