Massachusetts Law

MA 201 CMR 17.00 Compliance Checker

Assess your compliance with Massachusetts data privacy law. This regulation requires all businesses that own or license personal information about Massachusetts residents to implement comprehensive information security programs.

Note: 201 CMR 17.00 applies to all businesses, regardless of location, that own or license personal information about Massachusetts residents. Non-compliance can result in significant penalties.

Written Information Security Program

Comprehensive WISP Document

Do you have a written, comprehensive information security program (WISP)?

WISP Scope and Objectives

Does your WISP identify and assess reasonably foreseeable internal and external risks?

Annual WISP Review

Do you review and update your WISP at least annually?

Administrative Controls

Security Coordinator

Have you designated one or more employees to maintain the WISP?

Risk Assessment

Do you conduct risk assessments identifying reasonably foreseeable risks?

Employee Background Checks

Do you conduct background checks on employees with access to personal information?

Employee Training

Do you provide security training for employees who handle personal information?

Disciplinary Measures

Do you have disciplinary measures for security policy violations?

Technical Controls

Secure User Authentication

Do you implement secure authentication protocols (unique IDs, passwords)?

Access Controls

Do you restrict access to active users and active user accounts only?

Encryption of Personal Information

Do you encrypt all personal information on laptops, portable devices, and in transmission?

Firewall Protection

Do you have up-to-date firewall protection for your network?

Operating System Security Patches

Do you keep operating system security patches up to date?

Antivirus/Antimalware Software

Do you use up-to-date antivirus and antimalware software?

Monitoring for Unauthorized Access

Do you monitor systems for unauthorized access to or use of personal information?

Physical Security

Secure Storage

Is personal information stored in locked facilities, storage areas, or containers?

Secure Disposal

Do you have secure disposal procedures for paper and electronic records?

Third-Party Service Providers

Service Provider Agreements

Do you have written contracts with all third-party service providers?

Service Provider Compliance

Do contracts require service providers to maintain appropriate security measures?

Service Provider Monitoring

Do you monitor and verify service provider compliance with security obligations?

Please answer all requirements to see your results