By: Capriglione, et al. (Senate Sponsor - Nelson) H.B. No. 8 (In the Senate - Received from the House April 26, 2017; May 3, 2017, read first time and referred to Committee on Business & Commerce; May 19, 2017, reported adversely, with favorable Committee Substitute by the following vote: Yeas 9, Nays 0; May 19, 2017, sent to printer.)Click here to see the committee vote COMMITTEE SUBSTITUTE FOR H.B. No. 8 By: Creighton A BILL TO BE ENTITLED AN ACT relating to cybersecurity for state agency information resources. BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF TEXAS: SECTION 1. This Act may be cited as the Texas Cybersecurity Act. SECTION 2. Section 551.089, Government Code, is amended to read as follows: Sec. 551.089. DELIBERATION REGARDING SECURITY DEVICES OR SECURITY AUDITS; CLOSED MEETING [DEPARTMENT OF INFORMATION RESOURCES]. This chapter does not require a governmental body [the governing board of the Department of Information Resources] to conduct an open meeting to deliberate: (1) security assessments or deployments relating to information resources technology; (2) network security information as described by Section 2059.055(b); or (3) the deployment, or specific occasions for implementation, of security personnel, critical infrastructure, or security devices. SECTION 3. Section 552.139, Government Code, is amended by adding Subsection (d) to read as follows: (d) When posting a contract on an Internet website as required by Section 2261.253, a state agency shall redact information made confidential by this section or excepted from public disclosure by this section. Redaction under this subsection does not except information from the requirements of Section 552.021. SECTION 4. Subchapter C, Chapter 2054, Government Code, is amended by adding Section 2054.0594 to read as follows: Sec. 2054.0594. INFORMATION SHARING AND ANALYSIS CENTER. (a) The department shall establish an information sharing and analysis center to provide a forum for state agencies to share information regarding cybersecurity threats, best practices, and remediation strategies. (b) The department shall appoint persons from appropriate state agencies to serve as representatives to the information sharing and analysis center. (c) The department, using funds other than funds appropriated to the department in a general appropriations act, shall provide administrative support to the information sharing and analysis center. SECTION 5. Sections 2054.077(b) and (e), Government Code, are amended to read as follows: (b) The information resources manager of a state agency may prepare or have prepared a report, including an executive summary of the findings of the report, assessing the extent to which a computer, a computer program, a computer network, a computer system, a printer, an interface to a computer system, including mobile and peripheral devices, computer software, or data processing of the agency or of a contractor of the agency is vulnerable to unauthorized access or harm, including the extent to which the agency's or contractor's electronically stored information is vulnerable to alteration, damage, erasure, or inappropriate use. (e) Separate from the executive summary described by Subsection (b), a state agency [whose information resources manager has prepared or has had prepared a vulnerability report] shall prepare a summary of the agency's vulnerability report that does not contain any information the release of which might compromise the security of the state agency's or state agency contractor's computers, computer programs, computer networks, computer systems, printers, interfaces to computer systems, including mobile and peripheral devices, computer software, data processing, or electronically stored information. The summary is available to the public on request. SECTION 6. Section 2054.1125(b), Government Code, is amended to read as follows: (b) A state agency that owns, licenses, or maintains computerized data that includes sensitive personal information, confidential information, or information the disclosure of which is regulated by law shall, in the event of a breach or suspected breach of system security or an unauthorized exposure of that information: (1) comply[, in the event of a breach of system security,] with the notification requirements of Section 521.053, Business & Commerce Code, to the same extent as a person who conducts business in this state; and (2) not later than 48 hours after the discovery of the breach, suspected breach, or unauthorized exposure, notify: (A) the department, including the chief information security officer and the state cybersecurity coordinator; or (B) if the breach, suspected breach, or unauthorized exposure involves election data, the secretary of state. SECTION 7. Section 2054.133, Government Code, is amended by adding Subsections (b-1), (b-2), and (b-3) to read as follows: (b-1) The executive head and information security officer of each state agency shall annually review and approve in writing the agency's information security plan and strategies for addressing the agency's information resources systems that are at highest risk for security breaches. The plan at a minimum must include solutions that isolate and segment sensitive information and maintain architecturally sound and secured separation among networks. If a state agency does not have an information security officer, the highest ranking information security employee for the agency shall review and approve the plan and strategies. The executive head retains full responsibility for the agency's information security and any risks to that security. (b-2) Each state agency shall include in the agency's information security plan the actions the agency is taking to incorporate into the plan the core functions of "identify, protect, detect, respond, and recover" as recommended in the "Framework for Improving Critical Infrastructure Cybersecurity" of the United States Department of Commerce National Institute of Standards and Technology. The agency shall, at a minimum, identify any information the agency requires individuals to provide to the agency or the agency retains that is not necessary for the agency's operations. The agency may incorporate the core functions over a period of years. (b-3) A state agency's information security plan must include appropriate privacy and security standards that, at a minimum, require a vendor who offers cloud computing services or other software, applications, online services, or information technology solutions to any state agency to contractually warrant that data provided by the state to the vendor will be maintained in compliance with all applicable state and federal laws and rules as specified in the applicable scope of work, request for proposal, or other document requirements. SECTION 8. Section 2054.512, Government Code, is amended to read as follows: Sec. 2054.512. CYBERSECURITY [PRIVATE INDUSTRY-GOVERNMENT] COUNCIL. (a) The state cybersecurity coordinator shall [may] establish and lead a cybersecurity council that includes public and private sector leaders and cybersecurity practitioners to collaborate on matters of cybersecurity concerning this state. (b) The cybersecurity council must include: (1) one member who is an employee of the office of the governor; (2) one member of the senate appointed by the lieutenant governor; (3) one member of the house of representatives appointed by the speaker of the house of representatives; and (4) additional members appointed by the state cybersecurity coordinator, including representatives of institutions of higher education and private sector leaders. (c) In appointing representatives from institutions of higher education to the cybersecurity council, the state cybersecurity coordinator shall consider appointing members of the Information Technology Council for Higher Education. (d) The cybersecurity council shall provide recommendations to the legislature on any legislation necessary to implement cybersecurity best practices and remediation strategies for this state. SECTION 9. Subchapter N-1, Chapter 2054, Government Code, is amended by adding Section 2054.515 to read as follows: Sec. 2054.515. AGENCY INFORMATION SECURITY ASSESSMENT AND REPORT. (a) At least once every two years, each state agency shall conduct an information security assessment of the agency's information resources systems, network systems, digital data storage systems, digital data security measures, and information resources vulnerabilities. (b) Not later than December 1 of the year in which a state agency conducts the assessment under Subsection (a), the agency shall report the results of the assessment to the department, the governor, the lieutenant governor, and the speaker of the house of representatives. (c) The department by rule may establish the requirements for the information security assessment and report required by this section. SECTION 10. Section 2054.575(a), Government Code, is amended to read as follows: (a) A state agency shall, with available funds, identify information security issues and develop a plan to prioritize the remediation and mitigation of those issues. The agency shall include in the plan: (1) procedures for reducing the agency's level of exposure with regard to information that alone or in conjunction with other information identifies an individual maintained on a legacy system of the agency; (2) the best value approach for modernizing, replacing, renewing, or disposing of a legacy system that maintains information critical to the agency's responsibilities; (3) an analysis of the percentage of state agency personnel in information technology, cybersecurity, or other cyber-related positions who currently hold the appropriate industry-recognized certifications as identified by the National Initiative for Cybersecurity Education; (4) the level of preparedness of state agency cyber personnel and potential personnel who do not hold the appropriate industry-recognized certifications to successfully complete the industry-recognized certification examinations; and (5) a strategy for mitigating any workforce-related discrepancy in information technology, cybersecurity, or other cyber-related positions with the appropriate training and industry-recognized certifications. SECTION 11. Section 2059.055(b), Government Code, is amended to read as follows: (b) Network security information is confidential under this section if the information is: (1) related to passwords, personal identification numbers, access codes, encryption, or other components of the security system of a governmental entity [state agency]; (2) collected, assembled, or maintained by or for a governmental entity to prevent, detect, or investigate criminal activity; or (3) related to an assessment, made by or for a governmental entity or maintained by a governmental entity, of the vulnerability of a network to criminal activity. SECTION 12. Subtitle B, Title 10, Government Code, is amended by adding Chapter 2061 to read as follows: CHAPTER 2061. INDIVIDUAL-IDENTIFYING INFORMATION Sec. 2061.001. DEFINITIONS. In this chapter: (1) "Cybersecurity risk" means a material threat of attack, damage, or unauthorized access to the networks, computers, software, or data storage of a state agency. (2) "State agency" means a department, commission, board, office, council, authority, or other agency in the executive, legislative, or judicial branch of state government, including a university system or institution of higher education, as defined by Section 61.003, Education Code, that is created by the constitution or a statute of this state. Sec. 2061.002. DESTRUCTION AUTHORIZED. (a) A state agency shall destroy or arrange for the destruction of information that presents a cybersecurity risk and alone or in conjunction with other information identifies an individual in connection with the agency's networks, computers, software, or data storage if the agency is otherwise prohibited by law from retaining the information for a period of years. (b) This section does not apply to a record involving criminal activity or a criminal investigation retained for law enforcement purposes. (c) A state agency may not destroy or arrange for the destruction of any election data before the third anniversary of the date the election to which the data pertains is held. (d) A state agency may not under any circumstance sell: (1) a person's Internet browsing history; (2) a person's application usage history; or (3) the functional equivalent of the information described in Subdivisions (1) and (2). SECTION 13. Chapter 276, Election Code, is amended by adding Section 276.011 to read as follows: Sec. 276.011. ELECTION CYBER ATTACK STUDY. (a) Not later than December 1, 2018, the secretary of state shall: (1) conduct a study regarding cyber attacks on election infrastructure; (2) prepare a public summary report on the study's findings that does not contain any information the release of which may compromise any election; (3) prepare a confidential report on specific findings and vulnerabilities that is exempt from disclosure under Chapter 552, Government Code; and (4) submit to the standing committees of the legislature with jurisdiction over election procedures a copy of the report required under Subdivision (2) and a general compilation of the report required under Subdivision (3) that does not contain any information the release of which may compromise any election. (b) The study must include: (1) an investigation of vulnerabilities and risks for a cyber attack against a county's voting system machines or the list of registered voters; (2) information on any attempted cyber attack on a county's voting system machines or the list of registered voters; and (3) recommendations for protecting a county's voting system machines and list of registered voters from a cyber attack. (c) The secretary of state, using existing resources, may contract with a qualified vendor to conduct the study required by this section. (d) This section expires January 1, 2019. SECTION 14. (a) The lieutenant governor shall establish a Senate Select Committee on Cybersecurity and the speaker of the house of representatives shall establish a House Select Committee on Cybersecurity to, jointly or separately, study: (1) cybersecurity in this state; (2) the information security plans of each state agency; and (3) the risks and vulnerabilities of state agency cybersecurity. (b) Not later than November 30, 2017: (1) the lieutenant governor shall appoint five senators to the Senate Select Committee on Cybersecurity, one of whom shall be designated as chair; and (2) the speaker of the house of representatives shall appoint five state representatives to the House Select Committee on Cybersecurity, one of whom shall be designated as chair. (c) The committees established under this section shall convene separately at the call of the chair of the respective committees, or jointly at the call of both chairs. In joint meetings, the chairs of each committee shall act as joint chairs. (d) Following consideration of the issues listed in Subsection (a) of this section, the committees established under this section shall jointly adopt recommendations on state cybersecurity and report in writing to the legislature any findings and adopted recommendations not later than January 13, 2019. (e) This section expires September 1, 2019. SECTION 15. (a) In this section, "state agency" means a board, commission, office, department, council, authority, or other agency in the executive or judicial branch of state government that is created by the constitution or a statute of this state. The term does not include a university system or institution of higher education as those terms are defined by Section 61.003, Education Code. (b) The Department of Information Resources, in consultation with the Texas State Library and Archives Commission, shall conduct a study on state agency digital data storage and records management practices and the associated costs to this state. (c) The study required under this section must examine: (1) the current digital data storage practices of state agencies in this state; (2) the costs associated with those digital data storage practices; (3) the digital records management and data classification policies of state agencies and whether the state agencies are consistently complying with the established policies; (4) whether the state agencies are storing digital data that exceeds established retention requirements and the cost of that unnecessary storage; (5) the adequacy of storage systems used by state agencies to securely maintain confidential digital records; (6) possible solutions and improvements recommended by the state agencies for reducing state costs and increasing security for digital data storage and records management; and (7) the security level and possible benefits of and the cost savings from using cloud computing services for agency data storage, data classification, and records management. (d) Each state agency shall participate in the study required by this section and provide appropriate assistance and information to the Department of Information Resources and the Texas State Library and Archives Commission. (e) Not later than December 1, 2018, the Department of Information Resources shall issue a report on the study required under this section and recommendations for reducing state costs and for improving efficiency in digital data storage and records management to the lieutenant governor, the speaker of the house of representatives, and the appropriate standing committees of the house of representatives and the senate. (f) This section expires September 1, 2019. SECTION 16. The changes in law made by this Act do not apply to the Electric Reliability Council of Texas. SECTION 17. This Act takes effect September 1, 2017. * * * * *