U.S. New York SHIELD Act (S5575B) — Stop Hacks and Improve Electronic Data Security

SmartSuite provides the system for managing controls, evidence, mappings, assessments, and reporting. Framework text may require a separate license unless explicitly provided.
Overview
The New YorkSHIELD Act (S5575B) is a state data protection and cybersecurityregulation that requires organizations to implement reasonablesafeguards to protect the private information of New York residents.Its primary purpose is to reduce the risks of data breaches andenhance accountability for the security of personal data held bybusinesses and other covered entities.
Enacted by theState of New York, the SHIELD Act applies to anyorganization—regardless of location—that owns or licenses privateinformation of New York residents. The law covers areas includingadministrative, technical, and physical security controls, expandingthe definition of protected data and mandating prompt breachnotifications. It addresses cybersecurity risk management andcompliance oversight to strengthen personal data protection.
Organizationsrespond to the SHIELD Act’s requirements by conducting riskassessments, updating internal policies, deploying security controls,and maintaining evidence of compliance for regulatory review. The Actis often integrated with broader cybersecurity frameworks, such asNIST or ISO 27001, to support risk management programs and regulatorycompliance efforts.
Why it Matters
The New YorkSHIELD Act establishes robust requirements to safeguard personalinformation, helping organizations reduce data breaches and supportregulatory compliance obligations.
Key benefitsinclude:
• Strengthen data security practices
Encourage theadoption of administrative, technical, and physical safeguards toprotect sensitive personal information from unauthorized access.
• Improve incident response readiness
Support promptdetection, reporting, and remediation of security incidents involvingNew York residents’ private data.
• Enhance regulatory compliance support
Enableorganizations to demonstrate adherence to state privacy laws,reducing legal exposure and enforcement risks.
• Increase audit and reporting readiness
Provide clearcriteria for documenting security practices, making regulatory auditsand internal assessments more efficient.
• Promote customer trust and confidence
Demonstratecommitment to data privacy, fostering stronger relationships withclients, partners, and the broader public.
How it Works
The New YorkSHIELD Act establishes a set of regulatory requirements for datasecurity tailored to organizations handling private information ofNew York residents. Rather than adhering to a checklist ofprescriptive controls, the SHIELD Act structures its framework arounda risk-based approach, outlining three categories of safeguards:administrative, technical, and physical. Organizations must implement“reasonable” security safeguards appropriate for the size andcomplexity of the business, the nature of its operations, and thesensitivity of information processed.
In practice,organizations implement the SHIELD Act by evaluating and enhancingtheir information security programs to incorporate safeguards such asemployee security training, network monitoring, risk assessments, andincident response procedures. They regularly review their practicesto maintain compliance, map security controls to legal requirements,document risk management activities, and conduct periodic assessmentsto monitor ongoing adherence.
UsingSmartSuite, organizations can operationalize the SHIELD Actrequirements by leveraging control libraries to align safeguards,maintaining risk registers to track and assess risks, managingdocumentation of policies and procedures, and collecting evidence forcompliance audits. Automated compliance tracking, remediationworkflows, and reporting dashboards support ongoing governance,facilitate monitoring, and help prepare for regulatory inquiries orincidents.
Key Elements
• Data Security Program Requirements
Describes theorganizational obligation to develop, implement, and maintain arobust data security program.
• Risk Assessment Processes
Outlinesstructured procedures for identifying, evaluating, and addressingsecurity risks to private information.
• Administrative Safeguards
Specifiesmanagement practices and policies governing the security of sensitivedata and personnel conduct.
• Technical Safeguards
Definestechnological controls such as encryption, monitoring, and accessrestrictions to protect electronic data.
• Physical Safeguards
Establishesmeasures to secure physical premises and equipment containing privateinformation from unauthorized access.
• Vendor and Third-Party Oversight
Organizesrequirements for managing and evaluating the security practices ofservice providers and contractors.
• Incident Detection and Response
Describesmechanisms for identifying, reporting, and responding to securitybreaches and data incidents.
Framework Scope
The U.S. NewYork SHIELD Act (S5575B) is implemented by businesses and entitiesthat collect or maintain private information of New York residents.It governs data protection measures across information systems andpersonal data repositories, and is typically adopted to comply withlegal requirements while enhancing privacy programs and risk-basedsecurity management.
Framework Objectives
The New YorkSHIELD Act (S5575B) outlines key objectives to strengthen dataprotection and regulatory compliance for organizations handlingprivate information.
• Safeguard personal data through enhanced cybersecurity riskmanagement practices
• Strengthen governance and oversight of information securitycontrols
• Ensure compliance with regulatory requirements for dataprotection and breach notification
• Promote operational resilience against emerging cybersecuritythreats and data breaches
• Support audit readiness and demonstrate accountability toregulatory authorities
• Enhance trust by maintaining high standards for data privacy andinformation security The New York SHIELD Act establishes datasecurity requirements for businesses handling private information ofNew York residents and aligns with general principles found inframeworks like NIST Cybersecurity Framework, HIPAA, and GLBA.Organizations typically implement SHIELD Act controls to fulfillstate regulatory compliance, improve privacy practices, anddemonstrate accountability in safeguarding sensitive personal data.
Common Framework Mappings
The New YorkSHIELD Act is commonly mapped to other data protection and securityframeworks to ensure comprehensive compliance, facilitate riskmanagement, and streamline reporting across multiple regulatory andindustry standards.
Mappedframeworks include:
CIS CriticalSecurity Controls
COBIT
GDPR
HIPAA
ISO/IEC 27001
ISO/IEC 27002
NISTCybersecurity Framework
NIST SP 800-53
PCI DSS
SOC 2
- ClassicifationCategoryData Protection & PrivacyDomainPrivacyFramework FamilyGlobal Privacy Regulations
- Regulatory ContextTypeRegulationLegal InstrumentActSectorCross-SectorIndustryCross-Industry
- Region / PublisherRegionNorth AmericaRegion DetailNew YorkPublisherOffice of the New York State Attorney General
- VersioningVersion2019Effective DateOctober 23, 2019Issue DateJuly 25, 2019
- AdoptionAdoption ModelRegulatory ComplianceImplementation ComplexityModerate
- Official ReferenceOpen Link in New TabSource
License included / downloadable: Yes
The New York SHIELD Act (S5575B) is published by the New York State Legislature and is publicly available via official state government publications and websites.License included with platform
How SmartSuite Supports NY SHIELD Act
Manage New York data security and breach notification requirements by organizing SHIELD Act obligations, tracking reasonable security controls, and maintaining evidence supporting protection of private information.
Reasonable Security Controls Framework
Structure administrative, technical, and physical safeguards required to protect private information.
Data Inventory and Classification
Track private information types, storage locations, and systems subject to SHIELD Act requirements.
Risk Assessment and Safeguard Implementation
Manage risk assessments and track implementation of required security measures across systems.
Access Governance and Data Protection Controls
Manage user access, authentication, encryption, and secure handling of sensitive data.
Security Incident and Notification Obligation Tracking
Track security incidents and manage notification obligations to affected individuals and regulators.
Data Protection Compliance Reporting
Provide dashboards showing control effectiveness, breach readiness, and compliance with New York data protection requirements.
Related frameworks

CCPA/CPRA is California privacy law giving residents control over personal data and requiring businesses to protect and disclose data practices.

CIS Controls v8.1 provides prioritized, practical security actions to help organizations mitigate common cyber threats and strengthen defenses.

The GLBA Safeguards Rule requires financial institutions to implement security programs to protect consumer financial information.

ISO/IEC 27001:2022 is an international ISMS standard that helps organizations manage information security risks and protect data.

NIST Cybersecurity Framework (CSF) v2.0 is a risk-based framework that helps organizations manage and reduce cybersecurity risks.
Frequently Asked Questions For New York SHIELD Act (Stop Hacks and Improve Electronic Data Security)
The SHIELD Act is designed to enhance the protection of private information for New York residents by requiring businesses to implement reasonable cybersecurity safeguards. It establishes data security requirements and expands the definition of private information subject to breach notification rules. The Act aims to reduce the risk of data breaches and improve incident response.
Yes, compliance with the SHIELD Act is mandatory for any business that owns or licenses private information of New York residents, regardless of whether the company is physically located in New York. Failure to comply can result in regulatory enforcement and significant penalties.
The SHIELD Act applies to all entities, whether large or small, that handle computerized private information of New York residents. This includes for-profit and not-for-profit organizations as well as third-party vendors processing data on behalf of covered entities.
The SHIELD Act requires organizations to implement "reasonable" administrative, technical, and physical data security safeguards. Key artifacts include written security programs, risk assessments, designated security personnel, employee training, and incident response procedures. The law also expands the definition of reportable data breaches.
Organizations should conduct risk assessments to identify threats, develop policies and procedures aligned with the Act’s safeguards, and assign responsibility for managing data security. Controls must be appropriate to the company's size, complexity, and the sensitivity of the data processed. Regular reviews and updates are encouraged to maintain effectiveness.
The SHIELD Act recognizes "compliant regulated entities" that already follow information security regulations such as HIPAA or GLBA as meeting its requirements. However, organizations are still required to comply with notification obligations and should ensure alignment between frameworks to address overlapping responsibilities.
Ongoing requirements include maintaining and updating security policies, continually monitoring risks, training staff, tracking incidents, and reporting breaches to affected individuals and, in some cases, to regulators. Organizations should regularly assess the effectiveness of their security measures and adapt them as threats evolve.
SmartSuite can support SHIELD Act compliance by providing modules for risk tracking, documenting and managing required controls, and organizing evidence of compliance activities. The platform enables audit readiness through centralized policy management, facilitates incident tracking, and generates reports needed for regulatory reviews and breach notifications.
Put CRI Profile into action with SmartSuite
Map controls, collect evidence, run assessments, manage remediation, and report readiness - all from a single connected system.

