Securiti leads GigaOm's DSPM Vendor Evaluation with top ratings across technical capabilities & business value.

View

US NAIC 670 – Insurance Information and Privacy Protection Model Act

Operationalize US NAIC 670 compliance with the most comprehensive PrivacyOps platform

Last Updated on September 29, 2023

Schedule Your
Personal Demo

Learn how you can leverage Securiti’s Data Command Center to address data security, privacy, governance, and compliance.

See a demo
Schedule your demo today

The National Association of Insurance Commissioners (NAIC) in the United States has developed several model rules and regulations that govern the insurance industry. This includes the NAIC Model Regulation 670, a model law - “US NAIC 670 – Insurance Information and Privacy Protection Model Act.” US NAIC 670 is included in the set of four primary model NAIC laws: the model Insurance Information and Privacy Protection Act (#670), the Insurance Data Security model law (#668), the model Privacy of Consumer Financial and Health Information Regulation (#672), or the model Standards for Safeguarding Customer Information Regulation (#673). These standards govern the collection, use, and disclosure of information in relation to insurance transactions by insurance institutions, agents, or insurance support organizations.

Many US states, including Arizona, California, Connecticut, Georgia, Illinois, Maine, Massachusetts, Nevada, New Jersey, North Carolina, Ohio, Oregon, and Virginia, have adopted the model Insurance Information and Privacy Protection Act (#670). The states of Kansas and Minnesota have adopted/incorporated some of the portions, while the state of Montana has adopted 670 as well as regulatory provisions implementing the Act.

The US NAIC 670 outlines guidelines for how insurance institutions, agents, and insurance support organizations must collect, utilize, and disclose data related to insurance transactions to strike a balance between those conducting the insurance business' need for information and the public's requirement for fairness in those activities' use of insurance information, including a need to minimize intrusion; to provide a legal framework that will allow individuals to know what information is being or has been obtained about them in connection with insurance transactions and to have access to that information to confirm or challenge its accuracy; and to restrict how information obtained for insurance transactions is shared, and to make it possible for insurance applicants and policyholders to understand the motives behind any unfavorable underwriting decisions.

The obligations of this Act shall apply to those insurance institutions, agents, or insurance support organizations which, on or after the effective date of this Act:

In the case of life, health, and disability insurance: (a) Collect, receive, or maintain information in connection with insurance transactions that pertain to natural persons who are residents of this state or (b) Engage in insurance transactions with applicants, individuals, or policyholders who are residents of this state, and

In the case of property or casualty insurance: (a) Collect, receive, or maintain information in connection with insurance transactions involving policies, contracts, or certificates of insurance delivered, issued for delivery, or renewed in this state, or (b) Engage in insurance transactions involving policies, contracts or certificates of insurance delivered, issued for delivery or renewed in this state.


The Solution

Securiti enables organizations to comply with US NAIC 670 – Insurance Information and Privacy Protection Model Act through AI-driven PI data discovery, DSR automation, documented accountability, enhanced visibility into data processing activities, and AI-driven process automation.

Securiti supports enterprises' journey toward compliance with US NAIC 670 – Insurance Information and Privacy Protection Model Act through automation, enhanced data visibility, and identity linking.

 

us naic compliance solution

Request a demo to learn how Securiti can aid you and your organization's compliance efforts today.


Assess US NAIC 670 Readiness

US NAIC 670

Utilize Securiti's collaborative readiness assessment template to assess your organization's compliance with NAIC 670 requirements, assess compliance gaps, and mitigate risks. Seamlessly expand assessment capabilities across your vendor ecosystem to maintain compliance against this standard.

US NAIC 670 Readiness assessment
us naic Privacy Notice Management

Automate Privacy Notice Creation & Management

US NAIC 670 Sections: 4, 7

Securiti's Privacy Notice Creation and Management module enables organizations to provide a notice of information practices. Privacy notices can be provided when personal information is being collected from individuals, including details on the purposes of data collection, the types of personal information, and a description of the rights of individuals.

Universal Consent Management

US NAIC 670 Sections: 6, 13(A)

Securiti's Universal Consent Management enables organizations to obtain consent/written authorization from individuals to disclose their personal or privileged information concerning an insurance transaction and other data processing activities.

Universal Consent Management
us naic right to access

Automate Right to Access Information

US NAIC 670 Sections: 8, 7(A)(2)

Securiti's Data Subject Rights Fulfillment enables organizations to provide access to recorded personal information to individuals upon their request. Individuals can make a written request to access their recorded personal information, medical-record information, as well as the identity of the medical professional or medical care institution, and as per the NAIC 670, organizations must honor an individual's request within thirty (30) business days from the date such request is received. Organizations can also utilize DSR automation to enable individuals to receive a copy of their investigative consumer reports.

Automate the Right to Correction, Amendment, or Deletion

US NAIC 670 Section: 9

Securiti's Data Subject Rights Fulfillment enables organizations to honor an individual's request to correct, amend, or delete their recorded personal information.

right to delete

Key Facts about US NAIC 670 – Insurance Information and Privacy Protection Model Act

1

Under NAIC 670, individuals have the right to request access to recorded personal information, disclosure of the insurer's identity, the source of collected information, and the right to amend and delete the collected personal information.

2

The insurer is obligated to provide a written notice on collecting personal information.

3

The insurance institution, agent, or insurance support organization has an obligation not to disclose any personal or privileged information about an individual without the written authorization of the individual unless certain exceptions apply.

4

In addition to issuing a cease and desist order, the Commissioner may order payment of a monetary penalty of not more than $500 for each violation but not to exceed $10,000 in total for multiple violations when a hearing results in the finding of a knowing violation of this Act.

5

Any person who disregards a cease-and-desist order issued by the Commissioner may face one or more penalties at the Commissioner's discretion, following notice and hearing, including (1) A monetary fine of not more than $10,000 for each violation; (2) If the Commissioner determines that offenses have happened frequently enough to qualify as a regular business practice, a monetary penalty of no more than $50,000; license suspension or revocation for insurance institution or agent license.

IDC MarketScape

Securiti named a Leader in the IDC MarketScape for Data Privacy Compliance Software

Read the Report

Videos

View More

Mitigating OWASP Top 10 for LLM Applications 2025

Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...

View More

DSPM vs. CSPM – What’s the Difference?

While the cloud has offered the world immense growth opportunities, it has also introduced unprecedented challenges and risks. Solutions like Cloud Security Posture Management...

View More

Top 6 DSPM Use Cases

With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...

View More

Colorado Privacy Act (CPA)

What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...

View More

Securiti for Copilot in SaaS

Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...

View More

Top 10 Considerations for Safely Using Unstructured Data with GenAI

A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....

View More

Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes

As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...

View More

Navigating CPRA: Key Insights for Businesses

What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...

View More

Navigating the Shift: Transitioning to PCI DSS v4.0

What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...

View More

Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)

AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...

Spotlight Talks

Spotlight 13:38

Accelerating Miracles — How Sanofi is Embedding AI to Significantly Reduce Drug Development Timelines

Sanofi Thumbnail
Watch Now View
Spotlight 10:35

There’s Been a Material Shift in the Data Center of Gravity

Watch Now View
Spotlight 14:21

AI Governance Is Much More than Technology Risk Mitigation

AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3

You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge

Watch Now View
Spotlight 47:42

Cybersecurity – Where Leaders are Buying, Building, and Partnering

Rehan Jalil
Watch Now View
Spotlight 27:29

Building Safe AI with Databricks and Gencore

Rehan Jalil
Watch Now View
Spotlight 46:02

Building Safe Enterprise AI: A Practical Roadmap

Watch Now View
Spotlight 13:32

Ensuring Solid Governance Is Like Squeezing Jello

Watch Now View
Spotlight 40:46

Securing Embedded AI: Accelerate SaaS AI Copilot Adoption Safely

Watch Now View
Spotlight 10:05

Unstructured Data: Analytics Goldmine or a Governance Minefield?

Viral Kamdar
Watch Now View

Latest

Pete Angstadt joins Securiti View More

Why I joined Securiti

I’m thrilled to be joining Securiti as they embark on their next phase of growth. Why did I decide to join? In short -...

AI System Observability: Go Beyond Model Governance View More

AI System Observability: Go Beyond Model Governance

Across industries, AI systems are no longer just tools acting on human prompts. The AI landscape is evolving rapidly, and AI systems are gaining...

Top Data Security Challenges & How to Solve Them View More

Top Data Security Challenges & How to Solve Them

Learn the top data security challenges organizations face today. Learn about the challenge and its solution. Enhance your data security posture today.

View More

How to Implement a Robust Data Security Framework

Data privacy regulations mandate strict data security measures. Learn how to implement a robust data security framework to ensure swift compliance.

Mastering Cookie Consent: Global Compliance & Customer Trust View More

Mastering Cookie Consent: Global Compliance & Customer Trust

Discover how to master cookie consent with strategies for global compliance and building customer trust while aligning with key data privacy regulations.

Why Data Access Is Your Weakest Link—And How DSPM Fixes It View More

Why Data Access Is Your Weakest Link—And How DSPM Fixes It

Learn how DSPM provides unified Data+AI Access governance, offering contextual data intelligence, automated controls, safe AI+data access, and consistent least-privilege enforcement.

From AI Risk to AI Readiness: Why Enterprises Need DSPM Now View More

From AI Risk to AI Readiness: Why Enterprises Need DSPM Now

Discover why shifting focus from AI risk to AI readiness is critical for enterprises. Learn how Data Security Posture Management (DSPM) empowers organizations to...

The European Health Data Space Regulation View More

The European Health Data Space Regulation: A Legislative Timeline and Implementation Roadmap

Download the infographic on the European Health Data Space Regulation, which features a clear timeline and roadmap highlighting key legislative milestones, implementation phases, and...

Gencore AI and Amazon Bedrock View More

Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock

Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...

DSPM Vendor Due Diligence View More

DSPM Vendor Due Diligence

DSPM’s Buyer Guide ebook is designed to help CISOs and their teams ask the right questions and consider the right capabilities when looking for...

What's
New