Insurance

Why Must New Pet Insurance MGAs Ensure Their Technology Stack Meets NAIC Data Security Model Law Standards

Before You Handle a Single Policyholder Record: The Data Security Mandate That Can Shut Down Your MGA

More than 25 states have adopted the NAIC Insurance Data Security Model Law into enforceable regulation, and it applies to every insurance licensee, including pet insurance MGAs, from the moment they begin handling nonpublic information. There is no grace period and no exemption for startups. NAIC data security pet insurance MGA compliance must be built into your technology stack before you write your first policy, or you risk fines, license revocation, and the loss of carrier partnerships that your entire business depends on.

For new MGAs planning to launch pet insurance in the U.S., understanding and implementing NAIC data security standards is a prerequisite, not an afterthought. This guide breaks down the Model Law's requirements, maps them to specific technology components, and provides a practical implementation roadmap for pet insurance MGAs.

What Is the NAIC Insurance Data Security Model Law and Why Does It Matter?

The NAIC Insurance Data Security Model Law (Model 668) is a regulatory framework requiring all insurance licensees, including MGAs, to develop, implement, and maintain a comprehensive information security program proportionate to the size and complexity of their operations. It matters because non-compliance exposes MGAs to regulatory penalties, carrier contract termination, and operational shutdowns.

1. Model Law Overview

The NAIC developed Model 668 in response to increasing cyber threats targeting the insurance industry. It establishes minimum standards for protecting the nonpublic information that insurance entities collect, store, and transmit.

Model Law ElementDescriptionMGA Obligation
Written security programDocumented information security programRequired before handling data
Risk assessmentIdentify and evaluate security threatsAnnual assessment required
Security measuresTechnical, administrative, physical controlsImplement and maintain
Oversight responsibilityDesignated security officerAppoint qualified individual
Third-party oversightVendor security due diligenceContractual and ongoing
Incident response planDocumented breach response proceduresRequired before handling data
Board reportingRegular security updates to leadershipAt least annually
Notification requirementsReport breaches to commissionerWithin 72 hours

2. Adoption Status Across States

Over 25 states have adopted versions of Model 668. Because pet insurance MGAs typically operate across multiple states, compliance with the strictest adopted version effectively becomes the operational standard.

3. Relationship to Other Frameworks

Model 668 aligns with but does not replace other regulatory frameworks. MGAs must also comply with GLBA Safeguards Rule, state-specific breach notification laws, PCI DSS for payment data, and any additional carrier-imposed security standards.

FrameworkRelationship to NAIC Model Law
GLBA Safeguards RuleFederal baseline; NAIC adds insurance-specific requirements
State breach notification lawsComplementary; NAIC adds proactive security program mandate
PCI DSSSpecific to payment card data; NAIC covers all nonpublic information
SOC 2Voluntary framework; NAIC is regulatory mandate
NIST CSFBest practice framework; NAIC compliance maps well to NIST functions

What Nonpublic Information Must Pet Insurance MGAs Protect Under the Model Law?

Under the Model Law, pet insurance MGAs must protect all nonpublic information, defined as any non-publicly available information including personal financial data, health-related information, and personally identifiable information that identifies an individual in combination with specific data elements.

1. Categories of Protected Information

Information CategoryExamples in Pet InsuranceProtection Level
Personal identifiers + data elementSSN, driver's license, financial account numbersHighest
Health-related informationPet medical records, veterinary history, diagnosesHigh
Financial informationIncome, credit history, payment card dataHighest
Insurance transaction dataPolicy details, claims history, coverage amountsHigh
Authentication credentialsPasswords, security questions, biometric dataHighest

2. Data in All States: Not Just Adopted States

Even if an MGA operates in a state that has not yet adopted Model 668, carriers typically require Model Law compliance as a contractual condition. AI in pet insurance for carriers is raising the bar for data security expectations, as carriers increasingly use AI systems that require secure data exchange with their MGA partners. Additionally, the trend toward universal adoption means MGAs should treat compliance as inevitable across all operating jurisdictions.

3. Third-Party Data Handling

The Model Law's definition of protected information extends to data held by third-party service providers on the MGA's behalf. Every vendor that touches policyholder data, from cloud hosting providers to document generation platforms, falls within the scope of compliance obligations.

What Are the Core Technology Requirements of the NAIC Data Security Model Law?

The core technology requirements include implementing access controls, encryption, network monitoring, secure development practices, and incident detection capabilities across every system that handles nonpublic information.

The Model Law takes a risk-based approach, meaning the specific controls you implement should be proportionate to the threats your MGA faces and the sensitivity of data you handle. However, certain baseline technical controls are expected regardless of MGA size.

1. Access Control Requirements

Restrict access to nonpublic information to only those individuals and systems that require it for legitimate business purposes. Implement role-based access controls (RBAC) and review access permissions at least quarterly.

Access Control ElementRequirementImplementation
User authenticationMulti-factor for all sensitive systemsMFA on PAS, claims, billing, email
Role-based accessMinimum necessary privilegeRBAC policies per system
Access reviewsQuarterly permission auditsAutomated access certification
Termination proceduresImmediate access revocation24-hour deactivation policy
Remote accessSecure VPN with MFAEnterprise VPN solution
Privileged accountsEnhanced monitoring and controlsPAM solution for admin accounts

2. Encryption Standards

Encrypt nonpublic information both at rest and in transit. The Model Law does not specify encryption algorithms, but industry best practice and regulatory expectation is AES-256 for data at rest and TLS 1.2 or higher for data in transit.

3. Network and System Monitoring

Implement continuous monitoring capabilities that detect unauthorized access, anomalous activity, and potential security incidents. Log all access to systems containing nonpublic information and retain logs for a minimum of 3 years.

4. Secure Development Practices

If your MGA builds custom software, implement secure development lifecycle (SDLC) practices including code review, vulnerability scanning, penetration testing, and secure configuration management. MGAs deploying AI in pet insurance capabilities must ensure that AI models and data pipelines follow the same SDLC rigor as traditional software. These practices are especially important when evaluating build vs buy decisions for technology components that handle sensitive data.

5. System Hardening and Patch Management

Maintain secure configurations for all systems and apply security patches within defined timelines. Critical patches should be applied within 48 hours, and all patches within 30 days of release.

Patch PriorityTimelineScope
Critical (actively exploited)Within 48 hoursAll affected systems
High (CVSS 7.0+)Within 7 daysAll affected systems
Medium (CVSS 4.0–6.9)Within 30 daysAll affected systems
Low (CVSS under 4.0)Next maintenance windowScheduled updates

Ensure your pet insurance MGA technology stack meets NAIC standards from day one.

Talk to Our Specialists

Visit Insurnest to learn how we help MGAs launch and scale pet insurance programs.

How Should Pet Insurance MGAs Conduct Risk Assessments Under the Model Law?

Pet insurance MGAs should conduct annual risk assessments that identify threats to nonpublic information, evaluate the likelihood and impact of each threat, assess the sufficiency of existing controls, and document remediation plans for identified gaps.

1. Risk Assessment Scope

The risk assessment must cover every system, process, and third party that handles nonpublic information. For a pet insurance MGA, this includes policy administration, claims management, billing, CRM, email, cloud infrastructure, and all vendor integrations.

2. Risk Assessment Methodology

Assessment StepDescriptionOutput
Asset inventoryCatalog all systems handling NPIAsset register
Threat identificationIdentify potential threats per assetThreat catalog
Vulnerability assessmentEvaluate weaknesses in controlsVulnerability report
Impact analysisAssess business impact of each threatImpact ratings
Likelihood evaluationEstimate probability of threat realizationLikelihood ratings
Risk scoringCombine impact and likelihoodRisk heat map
Control gap analysisCompare controls to requirementsGap report
Remediation planningDefine actions to address gapsRemediation roadmap

3. Risk Assessment Frequency

The Model Law requires risk assessment "as needed but no less frequently than annually." New MGAs should conduct their initial assessment before launch and reassess whenever significant changes occur to technology, operations, or the threat landscape.

4. Documentation Requirements

Maintain complete documentation of every risk assessment including methodology, findings, risk ratings, remediation plans, and completion status. Regulators will request this documentation during examinations.

How Does the Model Law Affect Third-Party Vendor Management for Pet Insurance MGAs?

The Model Law requires pet insurance MGAs to exercise due diligence in selecting third-party service providers, require contractual security commitments, and maintain ongoing oversight of vendor compliance with data protection standards.

1. Vendor Due Diligence Requirements

Before contracting with any vendor that will handle nonpublic information, MGAs must evaluate the vendor's security practices, certifications, breach history, and ability to protect data.

Due Diligence ElementAssessment MethodMinimum Standard
Security certificationsRequest SOC 2 Type II reportCurrent report within 12 months
Security policiesReview vendor security documentationComprehensive written program
Breach historyResearch public breach disclosuresNo material unresolved breaches
Data handling practicesEvaluate encryption and access controlsMeet or exceed MGA standards
Incident responseReview vendor incident response planDocumented with defined timelines
Financial stabilityAssess vendor financial healthAdequate resources for obligations

2. Contractual Security Requirements

Vendor contracts must include specific security commitments. The Model Law effectively requires MGAs to flow down their security obligations to service providers.

Contractual ClausePurposeKey Terms
Data protection standardsDefine minimum security controlsEncryption, access controls, monitoring
Breach notificationRequire timely incident notificationWithin 24–48 hours
Audit rightsAllow MGA or third-party auditsAnnual audit access
Data return/destructionEnsure data handling at contract endReturn or certified destruction
Subcontractor controlsExtend requirements to sub-processorsWritten consent for subcontracting
Insurance requirementsRequire vendor cyber liability coverageMinimum $1M coverage

3. Ongoing Vendor Monitoring

Due diligence is not a one-time event. MGAs must monitor vendor compliance continuously through annual security questionnaires, review of updated SOC 2 reports, monitoring for vendor breach disclosures, and periodic assessment of vendor financial health.

Using pre-built rating algorithms from vendors is common among new MGAs, but each vendor relationship must meet these third-party oversight requirements. This includes AI-powered pet insurance platforms for MGAs and AI-enabled TPA partners, both of which handle significant volumes of nonpublic policyholder data.

Need help evaluating vendor compliance with NAIC data security standards?

Talk to Our Specialists

Visit Insurnest to learn how we help MGAs launch and scale pet insurance programs.

What Incident Response Capabilities Does the Model Law Require?

The Model Law requires pet insurance MGAs to maintain a written incident response plan, designate a response team, establish notification procedures for regulators within 72 hours, and conduct post-incident analysis to prevent recurrence.

1. Incident Response Plan Components

Plan ComponentDescriptionResponsible Party
Detection and analysisIdentify and classify security eventsSecurity team / IT
ContainmentIsolate affected systems to prevent spreadSecurity team / IT
EradicationRemove threat from environmentSecurity team / vendor
RecoveryRestore systems and dataIT / operations
NotificationAlert regulators, carriers, affected individualsLegal / compliance
Post-incident reviewAnalyze root cause, update controlsSecurity team / leadership

2. Regulatory Notification Requirements

The Model Law requires notification to the insurance commissioner within 72 hours of determining that a cybersecurity event has occurred. Notification must include the nature of the event, data affected, remediation steps taken, and contact information for the MGA's security team.

3. Commissioner Notification Content

Notification ElementDescription
Date of event discoveryWhen the MGA became aware
Description of eventNature and scope of the incident
Data types affectedCategories of NPI compromised
Number of consumers affectedEstimated count of affected individuals
Remediation actionsSteps taken to contain and remediate
Law enforcement contactWhether law enforcement was notified
Contact personMGA's designated point of contact

What Does NAIC Data Security Model Law Compliance Implementation Look Like for Pet Insurance MGAs?

Implementation involves a structured 12 to 16 week program covering risk assessment, security program documentation, technical control deployment, vendor assessment, employee training, and validation testing before handling any nonpublic information.

1. Implementation Timeline

PhaseDurationActivities
Phase 1: Program development2–3 weeksWritten security program, policies, risk assessment methodology
Phase 2: Risk assessment2–3 weeksAsset inventory, threat analysis, control gap assessment
Phase 3: Technical controls3–4 weeksEncryption, MFA, monitoring, patch management, access controls
Phase 4: Vendor assessment2–3 weeksVendor due diligence, contract amendments, monitoring setup
Phase 5: Training and testing2–3 weeksEmployee training, tabletop exercises, penetration testing
Phase 6: Validation1–2 weeksCompliance checklist verification, documentation review
Total12–18 weeksFull NAIC compliance implementation

2. Cost Breakdown

ComponentEstimated Cost
Written security program development$5,000–$15,000
Risk assessment (initial)$5,000–$20,000
Technical control implementation$15,000–$50,000
Vendor assessment program$3,000–$10,000
Employee training$2,000–$8,000
Penetration testing$5,000–$15,000
Legal review of compliance$3,000–$10,000
Total$38,000–$128,000

3. Ongoing Annual Compliance Costs

Annual ActivityEstimated Cost
Risk assessment update$3,000–$10,000
Security tool subscriptions$5,000–$15,000
Penetration testing$5,000–$15,000
Employee training renewals$1,000–$5,000
Vendor reassessments$2,000–$8,000
Compliance monitoring$3,000–$10,000
Total Annual$19,000–$63,000

Build a NAIC-compliant technology stack for your pet insurance MGA.

Talk to Our Specialists

Visit Insurnest to learn how we help MGAs launch and scale pet insurance programs.

Frequently Asked Questions

What is the NAIC Insurance Data Security Model Law?

The NAIC Insurance Data Security Model Law (Model 668) is a regulatory framework requiring insurance licensees to implement comprehensive information security programs to protect nonpublic information from unauthorized access and breaches.

Which states have adopted the NAIC Data Security Model Law?

As of 2025, over 25 states have adopted versions of the NAIC Data Security Model Law, with more states considering adoption, making compliance essential for MGAs operating across multiple jurisdictions.

Does the NAIC Data Security Model Law apply to pet insurance MGAs?

Yes, the law applies to all insurance licensees including MGAs, regardless of line of business. Pet insurance MGAs handling nonpublic policyholder information must comply in every adopted state where they operate.

What are the penalties for non-compliance with the NAIC Data Security Model Law?

Penalties include fines up to $500 per violation (unlimited aggregate in some states), license suspension or revocation, cease-and-desist orders, and mandatory corrective action plans.

What technology components must comply with NAIC data security standards?

Every technology component that stores, processes, or transmits nonpublic information must comply, including policy administration systems, claims platforms, CRM tools, billing systems, email, and cloud infrastructure.

How long do pet insurance MGAs have to comply after launching?

Compliance must be in place before handling nonpublic information. The law does not provide a grace period for new licensees, so MGAs must implement security programs before writing their first policy.

Do pet insurance MGAs need to file their information security program with regulators?

Most states do not require proactive filing but mandate that the written security program be available for examination. Some states require annual certification of compliance to the insurance commissioner.

How does the NAIC Data Security Model Law affect vendor selection for pet insurance MGAs?

MGAs must conduct due diligence on all third-party service providers handling nonpublic information, require contractual security commitments, and monitor vendor compliance as part of their information security program.

Sources

Meet Our Innovators:

We aim to revolutionize how businesses operate through digital technology driving industry growth and positioning ourselves as global leaders.

circle basecircle base
Pioneering Digital Solutions in Insurance

Insurnest

Empowering insurers, re-insurers, and brokers to excel with innovative technology.

Insurnest specializes in digital solutions for the insurance sector, helping insurers, re-insurers, and brokers enhance operations and customer experiences with cutting-edge technology. Our deep industry expertise enables us to address unique challenges and drive competitiveness in a dynamic market.

Get in Touch with us

Ready to transform your business? Contact us now!