NYDFS Fines OneMain $4.25M for Cybersecurity Failures

June 13, 2023

Reading Time : 3 min

On May 25, 2023, the New York Department of Financial Services (NYDFS) announced that  OneMain Financial Group (OneMain) will pay a $4.25 million fine pursuant to a consent order to settle alleged violations of NYDFS’s Cybersecurity Regulation (23 NYCRR Part 500), which included improperly storing passwords and not sufficiently managing risk from third-party data storage. According to NYDFS, OneMain has also agreed to engage in significant remediation measures as part of the settlement.

The Cybersecurity Regulation went into effect in 2017 and mandates minimum cybersecurity standards for any banking, insurance and brokerage firms using a license to operate in New York.1 OneMain is a licensed lender and mortgage servicer that specializes in non-prime lending, making the publically traded company a covered entity subject to the Cybersecurity Regulation.

In its consent order, NYDFS claims that a review of OneMain’s cybersecurity policies uncovered deficiencies in compliance and internal controls that led to an enforcement investigation regarding violations of the Cybersecurity Regulation. NYDFS’s findings included the following: 

  1. Lack of Documentation for Cybersecurity Policy–There was a lack of sufficient documentation to effectively implement and maintain a written policy to address business continuity and disaster recovery planning and resources (BCDR). The company’s BCDR was insufficient as it did not document the requirements, functions and interdependencies of their system.
  2. Lack of Limitations for Access Privileges–There were a number of issues with the requirement to limit access privileges, including storing key passwords in a shared folder named “PASSWORDS.” This vulnerability could allow anyone with access to that internal shared drive to alter, delete or move the folder.
  3. Application Security Problems–Although it conducted extensive in-house application development, the company’s written policies for protecting information systems and nonpublic information (NPI) did not include a formalized methodology covering the entire software development lifecycle.
  4. Cybersecurity Personnel and Intelligence Training Deficiencies–The company did not effectively track or adequately implement training for over 500 information technology employees. The company also did not provide secure coding training for its developers, which would have helped developers with identifying security vulnerabilities in their applications.
  5. Issues with Third-Party Service Provider Security Policy–While the company had vendor risk assessments that ranked the level of risk with the appropriate level of due diligence that should be performed, the company did not timely perform due diligence on certain high and medium risk vendors. Some vendors were allowed to begin working without completion of onboarding security questionnaires. Relatedly, when a vendor improperly handled NPI, the company did not adjust risk scores but simply terminated its relationship with the vendor, and did so without enhancing its own third-party policies.

According to the consent order, security gaps like these may have contributed to three cybersecurity events OneMain suffered from 2017-2020, and many of the gaps were identified by the company previously by its internal audit unit. This case parallels a similar order from NYDFS to EyeMed in October 2022, where the company settled for $4.5 million for alleged violations of the Cybersecurity Regulation in connection with a July 2020 email data breach (read more about that case here). 

Similar to the EyeMed settlement, OneMain agreed to take specific actions to improve its cybersecurity controls and procedures, including, but not limited to: implementation of a written BCDR policy with documentation, a proper access privilege plan and up-to-date personnel training. The consent order acknowledges OneMain’s cooperation and credits its ongoing efforts to continuously improve its cybersecurity program.

For more information on cybersecurity expectations for businesses in New York, the New York Attorney General’s (AG) recent publication on effective data security provides guidance based on the AG’s data breach-related investigations and prosecutions, including password hygiene, customers notice and other cybersecurity best practices.

Please contact a member of Akin’s cybersecurity, privacy and data protection team if you have any questions about the NYDFS Cybersecurity Regulation or how it may affect your company.

1 Covered entities include: partnerships, corporations, branches, agencies and associations operating under, or required to operate under, a license, registration, charter, certificate, permit, accreditation or similar authorization under the Banking Law, the Insurance Law or the Financial Services Law. 23 NYCRR § 500.1.

Share This Insight

Previous Entries

Data Dive

February 21, 2025

The Department of Justice’s (DOJ) final rule implements President Biden’s Executive Order 14117 of February 28, 2024, on “Preventing Access to Americans’ Bulk Sensitive Personal Data and United States Government-Related Data by Countries of Concern” (EO) and is intended to address a perceived gap in existing national security authorities to adequately address threats posed by the continuing effort of certain countries of concern to access Americans’ sensitive personal data and U.S. government-related data. (For additional information, please see our prior alerts on the proposed rule and issuance of the EO and DOJ’s accompanying advance notice of proposed rulemaking). This new and very complex regulatory regime reflects the U.S. government’s growing national security concerns about China and other adversarial governments obtaining access to Americans’ sensitive personal data through sales and licensing agreements, as well as certain vendor, employment and investment transactions, and that such agreements and transactions could enable these countries to use biometric, financial, ‘omic, geolocation or health data or other personal identifiers to engage in malicious cyber-enabled activities, espionage, tracking of military and national security personnel, blackmail or other nefarious activities.

...

Read More

Data Dive

January 22, 2025

On January 17, 2025, days before the inauguration, former President Joe Biden issued an executive order titled Strengthening and Promoting Innovation in the Nation's Cybersecurity (EO 14144). Building on previous efforts, including Executive Order 14028, this directive seeks to bolster cybersecurity across federal systems, supply chains and critical infrastructure from adversarial nations, particularly from the People’s Republic of China (PRC).

...

Read More

Data Dive

January 10, 2025

UPDATE: The California Privacy Protection Agency (CPPA) has extended the deadline for submitting public comments from January 14 to February 19, 2025, in response to the recent California wildfires. This extension aims to afford stakeholders additional time to provide comprehensive and detailed feedback, considering the significant challenges posed by the wildfires.

...

Read More

Data Dive

November 25, 2024

Treasury has issued a Final Rule to implement President Biden’s 2023 EO targeting U.S. investments in Chinese companies engaged in certain activities related to semiconductors, quantum computing or AI.

...

Read More

Data Dive

November 19, 2024

The European Union’s AI Office published the inaugural General-Purpose AI Code of Practice on November 14, 2024. The Code is intended to assist providers of AI models in their preparations for compliance with the forthcoming EU AI Act, to be enforced from August 2, 2025. The Code is designed to be both forward-thinking and globally applicable, addressing the areas of transparency, risk evaluation, technical safeguards and governance. While adherence to the Code is not mandatory, it is anticipated to serve as a means of demonstrating compliance with the obligations under the EU AI Act. Following a consultation period that garnered approximately 430 responses, the AI Office will be empowered to apply these rules, with penalties for nonconformity potentially reaching 3% of worldwide turnover or €15 million. Three additional iterations of the Code are anticipated to be produced within the coming five months.

...

Read More

Data Dive

November 15, 2024

On October 29, 2024, the DOJ issued a proposed rule prohibiting and restricting certain transactions that could allow persons from countries of concern, such as China, access to bulk sensitive personal data of U.S. citizens or to U.S. government-related data (regardless of volume).

...

Read More

Data Dive

October 17, 2024

During the course of any lending transaction, lenders will conduct a due diligence review of the borrower, including reviewing any relevant “know-your-customer” information.

...

Read More

Data Dive

September 17, 2024

Following the publication of the European Union’s Artificial Intelligence Act (AI Act or Act) on 12 July 2024, there are now a series of steps that various EU bodies need to take towards implementation. One of the first key steps is in relation to the establishment of codes of practice to “contribute to the proper application” of the AI Act.

...

Read More

© 2025 Akin Gump Strauss Hauer & Feld LLP. All rights reserved. Attorney advertising. This document is distributed for informational use only; it does not constitute legal advice and should not be used as such. Prior results do not guarantee a similar outcome. Akin is the practicing name of Akin Gump LLP, a New York limited liability partnership authorized and regulated by the Solicitors Regulation Authority under number 267321. A list of the partners is available for inspection at Eighth Floor, Ten Bishops Square, London E1 6EG. For more information about Akin Gump LLP, Akin Gump Strauss Hauer & Feld LLP and other associated entities under which the Akin Gump network operates worldwide, please see our Legal Notices page.