This website uses cookies. By clicking OK, you consent to the use of cookies. Click Here to learn more about how we use cookies.
OK
  • RSA.com
  • Products
    • Archer®
      • Archer®
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Ideas
      • Knowledge Base
      • Archer® Exchange
      • Training
      • Upcoming Events
      • Videos
    • RSA® Fraud & Risk Intelligence Suite
      • RSA® Fraud & Risk Intelligence Suite
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication On-Premise 14.x
      • RSA® Adaptive Authentication On-Premise 7.x
      • RSA® Adaptive Authentication for eCommerce
      • RSA® FraudAction Services
      • RSA® Web Threat Detection
      • Upcoming Events
      • Videos
    • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication Cloud
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Events
      • Ideas
      • Knowledge Base
      • Training
      • Upcoming Patch Content
      • Videos
    • RSA® Adaptive Authentication Mobile SDK
      • RSA® Adaptive Authentication Mobile SDK
      • Advisories
      • Events
      • Ideas
      • Knowledge Base
      • Request Access
      • Training
    • RSA® Adaptive Authentication On-Premise 14.x
      • RSA® Adaptive Authentication On-Premise 14.x
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Events
      • Ideas
      • Knowledge Base
      • Training
      • Videos
    • RSA® Adaptive Authentication On-Premise 7.x
      • RSA® Adaptive Authentication On-Premise 7.x
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Events
      • Ideas
      • Knowledge Base
      • Training
      • Videos
    • RSA® Adaptive Authentication for eCommerce
      • RSA® Adaptive Authentication for eCommerce
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Ideas
      • Knowledge Base
      • Training
      • Videos
    • RSA® FraudAction Services
      • RSA® FraudAction Services
      • Advisories
      • Discussions
      • Documentation
      • Ideas
      • Videos
    • RSA® Web Threat Detection
      • RSA® Web Threat Detection
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Ideas
      • Knowledge Base
      • Videos
    • RSA NetWitness® Platform
      • RSA NetWitness® Platform
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Ideas
      • Integrations
      • Knowledge Base
      • Training
      • Upcoming Events
      • Videos
    • RSA NetWitness® Detect AI
      • RSA NetWitness® Detect AI
      • Documentation
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
    • RSA NetWitness® Investigator
      • RSA NetWitness® Investigator
      • Documentation
      • Download the Client
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
    • RSA NetWitness® Orchestrator
      • RSA NetWitness® Orchestrator
      • Overview
      • Documentation
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
    • RSA SecurID® Suite
      • RSA SecurID® Suite
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Knowledge Base
      • Ideas
      • Integrations
      • Training
      • Videos
    • RSA® Identity Governance & Lifecycle
      • RSA® Identity Governance & Lifecycle
      • Advisories
      • Blog
      • Community Exchange
      • Discussions
      • Documentation
      • Downloads
      • Ideas
      • Knowledge Base
      • Training
      • Upcoming Events
      • Videos
    • RSA SecurID® Access
      • RSA SecurID® Access
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Ideas
      • Integrations
      • Knowledge Base
      • Training
      • Upcoming Events
      • Videos
    • Other RSA® Products
      • Other RSA® Products
      • RSA® Access Manager
      • RSA® Data Loss Prevention
      • RSA® Digital Certificate Solutions
      • RSA enVision®
      • RSA® Federated Identity Manager
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
  • Resources
    • Advisories
      • Product Advisories on RSA Link
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication Hosted
      • RSA® Adaptive Authentication On-Premise 7.x
      • RSA® Adaptive Authentication On-Premise 14.x
      • RSA® Adaptive Authentication for eCommerce
      • RSA® FraudAction Services
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Product Advisories
    • Blogs
      • Blogs on RSA Link
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication On-Premise 7.x
      • RSA® Adaptive Authentication On-Premise 14.x
      • RSA® Adaptive Authentication for eCommerce
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Blogs on RSA Link
    • Discussion Forums
      • Discussion Forums
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication On-Premise 7.x
      • RSA® Adaptive Authentication On-Premise 14.x
      • RSA® Adaptive Authentication for eCommerce
      • RSA® FraudAction Services
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Discussion Forums on RSA Link
    • Documentation
      • Product Documentation
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication Mobile SDK
      • RSA® Adaptive Authentication On-Premise 7.x
      • RSA® Adaptive Authentication On-Premise 14.x
      • RSA® Adaptive Authentication for eCommerce
      • RSA® FraudAction Services
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Documentation on RSA Link
    • Downloads
      • Product Downloads
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication On-Premise 7.x
      • RSA® Adaptive Authentication On-Premise 14.x
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Downloads on RSA Link
    • Ideas
      • Idea Exchange
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication Mobile SDK
      • RSA® Adaptive Authentication On-Premise 7.x
      • RSA® Adaptive Authentication On-Premise 14.x
      • RSA® Adaptive Authentication for eCommerce
      • RSA® FraudAction Services
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Documentation on RSA Link
    • Knowledge Base
      • Knowledge Base
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication Mobile SDK
      • RSA® Adaptive Authentication On-Premise 7.x
      • RSA® Adaptive Authentication On-Premise 14.x
      • RSA® Adaptive Authentication for eCommerce
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Knowledge Base Pages on RSA Link
    • Upcoming Events on RSA Link
      • Upcoming Events
    • Videos
      • Videos on RSA Link
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication On-Premise 7.x
      • RSA® Adaptive Authentication On-Premise 14.x
      • RSA® Adaptive Authentication for eCommerce
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Videos on RSA Link
  • Support
    • RSA Link Support
      • RSA Link Support
      • News & Announcements
      • Getting Started
      • Support Forum
      • Support Knowledge Base
      • Ideas & Suggestions
    • RSA Product Support
      • RSA Product Support
      • General Security Advisories and Statements
      • Product Life Cycle
      • Support Information
      •  
      •  
      •  
      •  
      •  
  • RSA Ready
  • RSA University
    • Certification Program
      • Certification Program
    • Course Catalogs
      • Course Catalogs
      • Archer®
      • RSA NetWitness® Platform
      • RSA SecurID® Suite
    • On-Demand Subscriptions
      • On-Demand Subscriptions
      • Archer®
      • RSA NetWitness® Platform
      • RSA SecurID® Suite
    • Product Training
      • Product Training
      • Archer®
      • RSA® Fraud & Risk Intelligence Suite
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
    • Student Resources
      • Student Resources
      • Access On-Demand Learning
      • Access Virtual Labs
      • Contact RSA University
      • Enrollments & Transcripts
      • Frequently Asked Questions
      • Getting Started
      • Learning Modalities
      • Payments & Cancellations
      • Private Training
      • Training Center Locations
      • Training Credits
      • YouTube Channel
    • Upcoming Events
      • Upcoming Events
      • Full Calendar
      • Conferences
      • Live Classroom Training
      • Live Virtual Classroom Training
      • Webinars
Sign In Register Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
Announcements

Archer® Exchange Documentation

Browse the official Archer Exchange documentation for helpful tutorials, step-by-step instructions, and other valuable resources.
  • RSA Link
  • :
  • Products
  • :
  • Archer
  • :
  • Archer Exchange
  • :
  • Documentation
  • :
  • U.S. State Data Security Laws Authoritative Source...
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

U.S. State Data Security Laws Authoritative Source Content

RSA Archer provides authoritative source content for U.S. State Data Security Laws.  Two authoritative source content packages are available:

 

  • Data Security Laws for Companies and Insurers - This import pack contains multiple state data security regulations.  The following state laws are included:
    • California State Law (§ 1798.91.04)  -  CA § 1798.91.04 - Security of Connected Devices. (2018)
    • California State Law (§ 1898.81.5)  -  CA § 1898.81.5 - Customer records. (2015) 
    • Colorado State Law (CO § 6-1-713.5)  -  CO § 6-1-713.5 - Protection of personal identifying information. (2018) 
    • Connecticut State Law (CT § 38a-999b)
    • Connecticut State Law (CT § 4e-70)
    • Florida State Law (FL § 501.171(2))  -  FL § 501.171(2) - Requirements for Data Security. (2014) 
    • Illinois State Law (815 ILCS 530/45)  -  815 ILCS 530/45 - Data security. (2017)
    • Indiana State Law (IN § 24-4.9-3-3.5)  -  IN § 24-4.9-3-3.5 - Duties of a data base owner. (2017) 
    • Kansas State Law (KS § 50-6,139b)  -  KS § 50-6,139b - Requirements for holders of personal information. (2016) 
    • Michigan State Law (MI 1956 PA 218, Chapter 5A (Bill MI H 6491))  -  MI H 6491 - Data Security. (2018) 
    • Minnesota State Law (MN § 325M.05)  -  MN § 325M.05 - SECURITY OF INFORMATION. (2002) 
    • Mississippi State Law (MS S 2831)  -  MS S 2831 - Insurance Data Security Law. (2019) 
    • NAIC Insurance Data Security Model Law  -  NAIC Insurance Data Security Model Law. (Q4 2017) 
    • Nevada State Law (NV §§ 603A.210)  -  NV §§ 603A.210 - Security measures. (2005) 
    • Nevada State Law (NV §§ 603A.215)  -  NV §§ 603A.215 - Security measures for data collector that accepts payment card. (2011) 
    • New Hampshire State Law (NH CHAPTER 420-P (Bill NH S 194))  -  NH S 194 - Insurance Data Security Law. (2019) 
    • Ohio State Law (OH § 1354 (1354.01 to 1354.05))  -  OH § 1354 - Businesses Maintaining Recognized Cybersecurity Programs (2018) 
    • Ohio State Law (OH Chapter 3965 (Bill OH S 273))  -  OH S 273 - Cybersecurity Requirements for Insurance Companies. (2019) 
    • South Carolina State Law (SC § 38-99)  -  SC § 38-99 - Insurance Data Security Act. (2019) 
    • Vermont State Law (VT § 2446)  -  VT § 2446 - Annual registration. (2019)
    • Vermont State Law (VT § 2447)  -  VT § 2447 - Data broker duty to protect information; standards; technical requirements. (2019) 

 

  • Data Security Laws for Government - This import pack contains multiple state data security regulations that are applicable for government entities.  The following state laws are included: 
    • Arizona State Law (AZ § 18-105)
    • California State Law (CA § 11549.3 & .4)
    • California State Law (CA § 8586.5)
    • California State Law (CA § 8592.30-8592.45)
    • Colorado State Law (CO §§ 24-37.5-403, -404, -404.5, -407)
    • Florida State Law (FL § 20.61)
    • Florida State Law (FL § 282.318)
    • Georgia State Law (GA § 50-25-4)
    • Idaho State Law (ID §§ 67-827/A)
    • Illinois State Law (20 ILCS 1375/Art. 5)
    • Illinois State Law (30 ILCS 5/3-2.4)
    • Indiana State Law (IN § 4-13.1-2-2)
    • Kansas State Law (KS § 75-7240)
    • Kentucky State Law (KY § 42.724)
    • Kentucky State Law (KY § 61.932)
    • Maryland State Law (MD § 10-1301 to 1304)
    • Minnesota State Law (MD § 16E.03)
    • New York State Law (NY § 103)
    • North Carolina State Law (NC § 143B-1376)
    • Ohio State Law (OH § 125.18)
    • Oklahoma State Law (OK § 62-34.32)
    • Oregon State Law (OR § 276A.300)
    • Oregon State Law (OR Chap. 110)
    • South Carolina State Law (SC § 93.21)
    • Texas State Law (TX § 2054.0286)
    • Utah State Law (UT § 63F-2-102)
    • Vermont State Law (3 V.S.A. chapter 56)
    • Virginia State Law (VA § 2.2-2009)
    • Virginia State Law (VA § 2.2-603)
    • Washington State Law (WA § 43.105.020)
    • Washington State Law (WA § 43.105.054)
    • Washington State Law (WA § 43.105.215)
    • Wyoming State Law (WY § 9-21-101)

 

Languages

This content is available in English only.

 

Mappings

The mappings for the U.S. State Data Security Authoritative Sources to the RSA Archer Control Standard Library are available in the authoritative source content pack.

 

Content Source

Links to the content sources are provided in the listing above.

 

Licensing Restrictions

The authoritative source content is available with the use of the RSA Archer Policy Program Management, RSA Archer IT Policy Program Management, and/or RSA Archer Authorization and Assessment use cases. No additional license is required.

 

For More Information

To learn more about the U.S. Data Security Authoritative Source Content:

  • Review the RSA Archer Content Import Tip Sheet for instructions on how to import content; and
  • Download the Data Security Laws for Companies and Insurers Authoritative Source Content Package
  • Download the Data Security Laws for Government Authoritative Source Content Package

 

For Additional Support

To learn more about this content, please contact your Account Rep for additional details. For technical support questions, please open a support case or contact RSA Archer at archersupport@rsa.com for more information.

Labels (1)
Labels:
  • Content

Tags (16)
  • Archer
  • Archer Exchange
  • authoritative source
  • compliance management
  • Content
  • content library
  • government
  • insurance
  • offering
  • Offering Overview
  • overview
  • RSA Archer
  • RSA Archer Exchange
  • RSA Archer Exchange Content
  • RSA Archer Suite
  • usgov vendor
0 Likes
Was this article helpful? Yes No
Share
No ratings
Version history
Last update:
‎2019-08-12 06:35 PM
Updated by:
Moderator ChristineTran Moderator
Contributors
  • ChristineTran
    ChristineTran

Related Content

Article Dashboard
  • Article History
Powered by Khoros
  • Products
  • Resources
  • Solutions
  • RSA University
  • Support
  • RSA Labs
  • RSA Ready
  • About RSA Link
  • Terms & Conditions
  • Privacy Statement
  • Provide Feedback
© 2021 RSA Security LLC or its affiliates.
All rights reserved.