NAIC Insurance Data Security Model Law (MDL-668)
State Department of Insurance Requirements
Carrier Appointment Security Requirements
Key Takeaways
TL;DR
The NAIC Insurance Data Security Model Law (MDL-668) has been adopted by 25 states and requires agencies to implement written information-security programs, conduct annual risk assessments, and report breaches within 72 hours.
Multi-state agencies must comply with the most restrictive cybersecurity framework among all states where they hold appointments.
Major carriers now condition agency appointments on demonstrated cybersecurity controls, including MFA, EDR, and written incident-response plans.
New York's 23 NYCRR 500 is the most prescriptive state-level regulation and sets the benchmark for multi-state compliance programs.
FAQ
Frequently asked questions
Does the NAIC Model Law apply to independent insurance agents?
Yes. In states that have adopted MDL-668, the law applies to all insurance "licensees," which includes independent agents, brokers, producers, and agencies. However, agents with fewer than 10 employees, less than $5 million in gross annual revenue, and no personal information of more than 5,000 consumers may qualify for limited exemptions from some (not all) requirements. You must still maintain a security program, report breaches, and comply with carrier-specific requirements.
What do I need to report to the state DOI after a cybersecurity incident?
Under MDL-668, you must notify your state DOI commissioner within 72 hours of determining that a cybersecurity event has occurred that is likely to materially harm a consumer or the normal operations of the licensee. The notification must include the date of the event, a description of how NPI was exposed, the number of consumers affected, and the remediation steps taken. You must also notify affected consumers in accordance with state breach-notification laws.
Can I lose carrier appointments for poor cybersecurity?
Yes. Carriers have broad discretion to terminate agency appointments, and cybersecurity non-compliance is an increasingly common reason for non-renewal. If a carrier conducts a security assessment and finds that your agency lacks basic controls — no MFA, no encryption, no incident-response plan — they may decline to renew your appointment. Some carriers provide a remediation window, but others terminate immediately if the risk is deemed unacceptable.
Get your Cyber Defense Score™ in 60 seconds.
100 tools. No installation. No credit card. Real evidence.