BILL ANALYSIS

 

 

 

C.S.H.B. 8

By: Capriglione

Government Transparency & Operation

Committee Report (Substituted)

 

 

 

BACKGROUND AND PURPOSE

 

Interested parties contend that, as sensitive information is increasingly stored online, there must be a commensurate increase in efforts to protect the data of private citizens from rapidly evolving and sophisticated cyber attacks. C.S.H.B. 8 seeks to minimize Texas' vulnerability to cyber attacks by creating a cybersecurity task force, providing for a cyber attack study and response plan for state agencies, and providing for education and training regarding cybersecurity risks and incidents.

 

CRIMINAL JUSTICE IMPACT

 

It is the committee's opinion that this bill does not expressly create a criminal offense, increase the punishment for an existing criminal offense or category of offenses, or change the eligibility of a person for community supervision, parole, or mandatory supervision.

 

RULEMAKING AUTHORITY

 

It is the committee's opinion that this bill does not expressly grant any additional rulemaking authority to a state officer, department, agency, or institution.

 

ANALYSIS

 

C.S.H.B. 8 amends the Government Code to include an assessment of an applicable state agency's cybersecurity practices using information available from the Department of Information Resources (DIR) or any other appropriate state agency among the criteria the Sunset Advisory Commission and its staff are required to consider for review in determining whether a public need exists for the continuation of the state agency or its advisory committees or for the performance of the functions of the agency or its advisory committees.

 

C.S.H.B. 8 requires the Department of Public Safety (DPS) to develop a plan to address cybersecurity risks and incidents in Texas, authorizes DPS to enter into an agreement with a national organization to support DPS efforts in implementing the components of the plan for which DPS lacks resources to address internally, and sets out the provisions the agreement may include. The bill requires DPS, in implementing the agreement's provisions, to seek to prevent unnecessary duplication of existing state agency programs or efforts and requires DPS, in selecting an organization with which to enter into the agreement, to consider the organization's previous experience in conducting cybersecurity training and exercises for state agencies and political subdivisions. The bill requires DPS to consult with institutions of higher education in Texas when appropriate based on an institution's expertise in addressing specific cybersecurity risks and incidents.

 

C.S.H.B. 8 requires the Homeland Security Council, in cooperation with DIR, to conduct a study regarding cyber incidents and significant cyber incidents, as those terms are defined by the bill, affecting state agencies and critical infrastructure that is owned, operated, or controlled by agencies and to develop a comprehensive state response plan to provide a format for each state agency to develop an agency-specific response plan and to implement the plan into the agency's required information security plan to be implemented by the agency in the event of a cyber incident or significant cyber incident affecting the agency or critical infrastructure that is owned, operated, or controlled by the agency. The bill requires the council to deliver the response plan and a report on the study's findings not later than September 1, 2018, to the public safety director of DPS, the governor, the lieutenant governor, the speaker of the house of representatives, and the chair of the committee of each chamber having primary jurisdiction over homeland security matters. The bill establishes that the response plan and the report are not public information for purposes of state public information law. These provisions expire December 1, 2018.

 

C.S.H.B. 8 expands the entities expressly not required by state open meetings law to conduct an open meeting for certain deliberations regarding security devices or security audits from the governing board of DIR to any governmental body. The bill authorizes a state agency in the executive, legislative, or judicial branch of state government, including a public institution of higher education, to spend public funds as appropriate to reimburse a state agency employee or administrator who serves in an information technology, cybersecurity, or other cyber-related position for fees associated with industry-recognized certification examinations.

 

C.S.H.B. 8 requires DIR to establish and lead a cybersecurity task force to engage task force members in policy discussions and to educate state agencies in the executive or judicial branch of state government, including a university system or institution of higher education, on cybersecurity issues. The bill sets out the duties of the task force and requires DIR to determine the composition of the task force, which is required to include representatives of such state agencies and may include other interested parties. The bill requires DIR in selecting representatives from institutions of higher education to consider selecting members of the Information Technology Council for Higher Education. The bill abolishes the task force September 1, 2019, unless DIR extends the task force until September 1, 2021. These provisions expire September 1, 2021.

 

C.S.H.B. 8 requires DIR to establish an information sharing and analysis center to provide a forum for state agencies in the executive or judicial branch of state government, including a university system or institution of higher education, to share information regarding cybersecurity threats, best practices, and remediation strategies, to appoint persons from appropriate state agencies to serve as representatives to the center, and to provide administrative support to the center using existing resources. The bill adds a temporary provision, set to expire September 1, 2021, that requires the cybersecurity task force to appoint persons to serve as representatives to the center until the task force is abolished.

 

C.S.H.B. 8 requires DIR to provide mandatory guidelines to state agencies in the executive or judicial branch of state government, including a university system or institution of higher education, regarding the continuing education requirements for cybersecurity training and the industry-recognized certifications that must be completed by all information resources employees of the agencies. The bill requires DIR to consult with the Information Technology Council for Higher Education on applying the guidelines to institutions of higher education.

 

C.S.H.B. 8 replaces an authorization for the information resources manager of a state agency in the executive or judicial branch of state government, including a university system or institution of higher education, to prepare or have prepared a report assessing the extent to which a computer, a computer program, a computer network, a computer system, an interface to a computer system, computer software, or data processing of the agency or of a contractor of the agency is vulnerable to unauthorized access or harm with a requirement that the manager do so and includes printers and mobile and peripheral devices among the technology subject to this assessment.

 

C.S.H.B. 8 expands the state agencies in the executive or judicial branch of state government, including a university system or institution of higher education, subject to certain Business & Commerce Code notification requirements in the event of a breach of system security to include a state agency that owns, licenses, or maintains computerized data that includes confidential information or information the disclosure of which is regulated by law. The bill expands events requiring such notification to include a suspected breach or an unauthorized exposure of that information. The bill requires an applicable state agency to notify DIR, including the chief information security officer and the state cybersecurity coordinator, not later than 48 hours after the discovery of a breach, suspected breach, or unauthorized exposure.

 

C.S.H.B. 8 requires the executive head and chief information security officer of each state agency in the executive or judicial branch of state government, including a university system or institution of higher education, to annually review and approve in writing the agency's information security plan and strategies for addressing the agency's information resources systems that are at highest risk for security breaches. The bill requires the highest ranking information security employee for a state agency to review and approve the plan and strategies if the agency does not have a chief information security officer, but specifies that the executive head retains full responsibility for the agency's information security and any risks to that security. The bill requires each state agency to file the required written approval for each year of the current state fiscal biennium with the Legislative Budget Board before submitting a legislative appropriation request for a state fiscal biennium. The bill requires each state agency to include in the agency's information security plan the actions the agency is taking to incorporate into the plan the core functions of "identify, protect, detect, respond, and recover" as recommended in the "Framework for Improving Critical Infrastructure Cybersecurity" of the U.S. Department of Commerce National Institute of Standards and Technology; requires the agency, at a minimum, to identify any information the agency requires individuals to provide to the agency or the agency retains that is not necessary for the agency's operations; and authorizes the agency to incorporate the core functions over a period of years. The bill requires a state agency's information security plan to include appropriate privacy and security standards that, at a minimum, require a vendor who offers cloud computing services or other software, applications, online services, or information technology solutions to any state agency to demonstrate that data provided by the state to the vendor will be maintained in compliance with all applicable state and federal laws and rules.

 

C.S.H.B. 8 requires each state agency in the executive or judicial branch of state government, including a university system or institution of higher education, at least once every five years and in accordance with DIR rules, to contract with an independent third party selected from a list provided by DIR to conduct an independent risk assessment of the agency's exposure to security risks in the agency's information resources systems and to conduct tests to practice securing systems and notifying all affected parties in the event of a data breach and to submit the results of the assessment to DIR. The bill requires DIR annually to compile the results of the independent risk assessments conducted in the preceding year, to prepare a public report on the general security issues covered by the assessments that does not contain any information the release of which may compromise any state agency's information resources system, and to prepare a confidential report on specific risks and vulnerabilities that is exempt from disclosure under state public information law. The bill also requires DIR to submit to the legislature a comprehensive annual report on the results of the independent risk assessments conducted during the preceding year that includes such public report, that identifies systematic or pervasive security risk vulnerabilities across state agencies and recommendations for addressing the vulnerabilities, and that does not contain any information the release of which may compromise any state agency's information resources system.

 

C.S.H.B. 8 requires each state agency in the executive or judicial branch of state government, other than certain public institutions of higher education, implementing a website or mobile application that processes any personally identifiable or confidential information to submit a data security plan to DIR during development and as early as feasible in the testing of the website or application and to submit any modification to the plan made during development. The bill requires the state agency, before deploying the website or application, to subject the website or application to a vulnerability and penetration test conducted by an independent third party and to address any identified high priority vulnerability. The bill sets out the required content of such a data security plan. The bill requires DIR to review each submitted data security plan and make any recommendations for changes to the plan to the state agency as soon as practicable after DIR reviews the plan unless a state agency has previously submitted a comprehensive security plan approved by DIR and has sufficient personnel and technology to review plans internally. The bill establishes that such a data security plan and any DIR recommendations for changes to the plan are not public information for the purposes of state public information law.

 

C.S.H.B. 8 requires each public institution of higher education to adopt and implement a policy for website and mobile application security procedures that complies with the bill's provisions. The bill requires the developer of a website or mobile application that processes confidential information for such an institution to submit to the institution's information security officer the information required under policies adopted by the institution to protect the privacy of individuals by preserving the confidentiality of information processed by the website or application before deploying the website or application. The bill requires such an institution before deploying such a website or application to subject the website or application to a vulnerability and penetration test conducted internally or by an independent third party. The bill requires the institution's policies, at a minimum, to require the developer to submit information describing the architecture of the website or application, the authentication mechanism for the website or application, and the administrator level access to data included in the website or application. The bill requires such an institution to submit such adopted policies to DIR and requires DIR to review the policies and make recommendations for appropriate changes.

 

C.S.H.B. 8 makes a vendor that contracts with the state to provide information resources technology or services for a state agency in the executive or judicial branch of state government, including a university system or institution of higher education, responsible for providing the following to state agency contracting personnel: written acknowledgement of any known cybersecurity risks associated with the technology identified in the vulnerability and penetration test; proof that any individual servicing the contract holds the appropriate industry-recognized certifications as identified by the National Initiative for Cybersecurity Education; a strategy for mitigating any technology or personnel-related cybersecurity risk identified in the vulnerability and penetration test; and an initial summary of any costs associated with addressing or remediating the identified technology or personnel-related cybersecurity risks.

 

C.S.H.B. 8 requires a state agency in the executive or judicial branch of state government, including a university system or institution of higher education, to include the following in the agency's plan developed to prioritize the remediation and mitigation of information security issues as a part of the legacy system modernization strategy: procedures for reducing the agency's level of exposure with regard to information that alone or in conjunction with other information identifies an individual maintained on a legacy system of the agency; the best value approach for modernizing, replacing, renewing, or disposing of a legacy system that maintains information critical to the agency's responsibilities; analysis of the percentage of state agency personnel in information technology, cybersecurity, or other cyber-related positions who currently hold the appropriate industry-recognized certifications as identified by the National Initiative for Cybersecurity Education; the level of preparedness of state agency cyber personnel and potential personnel who do not hold the appropriate industry-recognized certifications to successfully complete the industry-recognized certification examinations; and a strategy for mitigating any workforce-related discrepancy in information technology, cybersecurity, or other cyber-related positions with the appropriate training and industry-recognized certifications.

 

C.S.H.B. 8 clarifies that any governmental entity's network security information related to passwords, personal identification numbers, access codes, encryption or other components of its security system is considered confidential under a provision relating to restricted information of the Texas computer network security system.

 

C.S.H.B. 8 requires a state agency in the executive, legislative, or judicial branch of state government, including a public university system or public institution of higher education, to destroy or arrange for the destruction of information in a certain manner that presents a cybersecurity risk and alone or in conjunction with other information identifies an individual if the agency is not required to retain the information for a period of years under other law or for other legal reasons. This requirement expressly does not apply to a record involving criminal activity or a criminal investigation retained for law enforcement purposes. The bill adds a temporary provision, set to expire September 1, 2020, that requires each such state agency to develop the systems and policies necessary to comply with such requirement not later than September 1, 2019.

 

C.S.H.B. 8 requires DIR to periodically review guidelines on state agency information that may be stored by a cloud computing or other storage service and the cloud computing or other storage services available to agencies for that storage to ensure that an agency purchasing a major information resources project selects the most affordable, secure, and efficient storage service available to the agency. For purposes of that periodic review, a state agency includes an executive branch agency, the supreme court, the court of criminal appeals, a court of appeals, the Texas Judicial Council, and a public university system or a public institution of higher education, except for a public junior college. The bill requires such guidelines to include appropriate privacy and security standards that, at a minimum, require a vendor who offers cloud computing or other storage services or other software, applications, online services, or information technology solutions to any such state agency to demonstrate that data provided by the state to the vendor will be maintained in compliance with all applicable state and federal laws and rules.

 

C.S.H.B. 8 amends the Election Code to require the secretary of state to conduct a study regarding cyber attacks on election infrastructure, to prepare a public summary report on the study's findings that does not contain any information the release of which may compromise any election, to prepare a confidential report on specific findings and vulnerabilities that is exempt from disclosure under state public information law, and to submit a copy of the public summary report and a general compilation of the confidential report that does not contain any information the release of which may compromise any election to the standing committees of the legislature with jurisdiction over election procedures not later than December 1, 2018. The bill requires the study to include an investigation of vulnerabilities and risks for a cyber attack against a county's voting system machines or the list of registered voters, information on any attempted cyber attack on a county's voting system machines or the list of registered voters, and recommendations for protecting a county's voting system machines and list of registered voters from a cyber attack. The bill authorizes the secretary of state, using existing resources, to contract with a qualified vendor to conduct the study. These provisions expire January 1, 2019.

 

C.S.H.B. 8 requires the lieutenant governor to establish a Senate Select Committee on Cybersecurity and requires the speaker of the house of representatives to establish a House Select Committee on Cybersecurity to, jointly or separately, study cybersecurity in Texas, the information security plans of each state agency, and the risks and vulnerabilities of state agency cybersecurity. The bill sets out provisions relating to appointment of membership and designation of chairs by the lieutenant governor and the speaker of the house of representatives, as applicable, and requires such appointment and designation not later than November 30, 2017. The bill requires the committees to convene separately at the call of the chair of the respective committees or jointly at the call of both chairs. In joint meetings, the chairs of each committee are required to act as joint chairs. The bill requires the committees, following consideration of the specified issues, to jointly adopt recommendations on state cybersecurity and report in writing to the legislature any findings and adopted recommendations not later than January 13, 2019. These provisions expire September 1, 2019.

 

C.S.H.B. 8 requires DIR and the Texas State Library and Archives Commission (TSLAC) to conduct a study on the digital data storage and records management practices of state agencies in the executive or judicial branch of state government, excluding a university system or institution of higher education, and the associated costs to the state. The bill sets out the required contents of the study and requires each applicable state agency to participate in the study and to provide appropriate assistance and information to DIR and TSLAC. The bill requires DIR and TSLAC to issue a report on the study and recommendations for reducing state costs and for improving efficiency in digital data storage and records management to the lieutenant governor, the speaker of the house of representatives, and the appropriate standing committees of the house of representatives and the senate not later than December 1, 2018. These provisions expire September 1, 2019.

 

C.S.H.B. 8 expressly does not apply to the Electric Reliability Council of Texas.

 

EFFECTIVE DATE

 

September 1, 2017.

 

COMPARISON OF ORIGINAL AND SUBSTITUTE

 

While C.S.H.B. 8 may differ from the original in minor or nonsubstantive ways, the following comparison is organized and formatted in a manner that indicates the substantial differences between the introduced and committee substitute versions of the bill.

 

INTRODUCED

HOUSE COMMITTEE SUBSTITUTE

SECTION 1.  This Act may be cited as the Texas Cybersecurity Act.

 

SECTION 1. Same as introduced version.

 

 

SECTION 2.  Section 325.011, Government Code, is amended to read as follows:

Sec. 325.011.  CRITERIA FOR REVIEW.  The commission and its staff shall consider the following criteria in determining whether a public need exists for the continuation of a state agency or its advisory committees or for the performance of the functions of the agency or its advisory committees:

(1)  the efficiency and effectiveness with which the agency or the advisory committee operates;

(2)(A)  an identification of the mission, goals, and objectives intended for the agency or advisory committee and of the problem or need that the agency or advisory committee was intended to address; and

(B)  the extent to which the mission, goals, and objectives have been achieved and the problem or need has been addressed;

(3)(A)  an identification of any activities of the agency in addition to those granted by statute and of the authority for those activities; and

(B)  the extent to which those activities are needed;

(4)  an assessment of authority of the agency relating to fees, inspections, enforcement, and penalties;

(5)  whether less restrictive or alternative methods of performing any function that the agency performs could adequately protect or provide service to the public;

(6)  the extent to which the jurisdiction of the agency and the programs administered by the agency overlap or duplicate those of other agencies, the extent to which the agency coordinates with those agencies, and the extent to which the programs administered by the agency can be consolidated with the programs of other state agencies;

(7)  the promptness and effectiveness with which the agency addresses complaints concerning entities or other persons affected by the agency, including an assessment of the agency's administrative hearings process;

(8)  an assessment of the agency's rulemaking process and the extent to which the agency has encouraged participation by the public in making its rules and decisions and the extent to which the public participation has resulted in rules that benefit the public;

(9)  the extent to which the agency has complied with:

(A)  federal and state laws and applicable rules regarding equality of employment opportunity and the rights and privacy of individuals; and

(B)  state law and applicable rules of any state agency regarding purchasing guidelines and programs for historically underutilized businesses;

(10)  the extent to which the agency issues and enforces rules relating to potential conflicts of interest of its employees;

(11)  the extent to which the agency complies with Chapters 551 and 552 and follows records management practices that enable the agency to respond efficiently to requests for public information;

(12)  the effect of federal intervention or loss of federal funds if the agency is abolished; [and]

(13)  the extent to which the purpose and effectiveness of reporting requirements imposed on the agency justifies the continuation of the requirement; and

(14)  an assessment of the agency's cybersecurity practices.

 

SECTION 2.  Section 325.011, Government Code, is amended to read as follows:

Sec. 325.011.  CRITERIA FOR REVIEW.  The commission and its staff shall consider the following criteria in determining whether a public need exists for the continuation of a state agency or its advisory committees or for the performance of the functions of the agency or its advisory committees:

(1)  the efficiency and effectiveness with which the agency or the advisory committee operates;

(2)(A)  an identification of the mission, goals, and objectives intended for the agency or advisory committee and of the problem or need that the agency or advisory committee was intended to address; and

(B)  the extent to which the mission, goals, and objectives have been achieved and the problem or need has been addressed;

(3)(A)  an identification of any activities of the agency in addition to those granted by statute and of the authority for those activities; and

(B)  the extent to which those activities are needed;

(4)  an assessment of authority of the agency relating to fees, inspections, enforcement, and penalties;

(5)  whether less restrictive or alternative methods of performing any function that the agency performs could adequately protect or provide service to the public;

(6)  the extent to which the jurisdiction of the agency and the programs administered by the agency overlap or duplicate those of other agencies, the extent to which the agency coordinates with those agencies, and the extent to which the programs administered by the agency can be consolidated with the programs of other state agencies;

(7)  the promptness and effectiveness with which the agency addresses complaints concerning entities or other persons affected by the agency, including an assessment of the agency's administrative hearings process;

(8)  an assessment of the agency's rulemaking process and the extent to which the agency has encouraged participation by the public in making its rules and decisions and the extent to which the public participation has resulted in rules that benefit the public;

(9)  the extent to which the agency has complied with:

(A)  federal and state laws and applicable rules regarding equality of employment opportunity and the rights and privacy of individuals; and

(B)  state law and applicable rules of any state agency regarding purchasing guidelines and programs for historically underutilized businesses;

(10)  the extent to which the agency issues and enforces rules relating to potential conflicts of interest of its employees;

(11)  the extent to which the agency complies with Chapters 551 and 552 and follows records management practices that enable the agency to respond efficiently to requests for public information;

(12)  the effect of federal intervention or loss of federal funds if the agency is abolished; [and]

(13)  the extent to which the purpose and effectiveness of reporting requirements imposed on the agency justifies the continuation of the requirement; and

(14)  an assessment of the agency's cybersecurity practices using information available from the Department of Information Resources or any other appropriate state agency.

 

SECTION 3.  Subchapter A, Chapter 411, Government Code, is amended by adding Section 411.00431 to read as follows:

Sec. 411.00431.  CYBERSECURITY RISKS AND INCIDENTS. 

 

 

(a)  The department may enter into an agreement with a national organization, including the National Cybersecurity Preparedness Consortium, to support the department's efforts in addressing cybersecurity risks and incidents in this state. 

 

The agreement may include provisions for:

(1)  providing

 

 

training to state and local officials and first responders preparing for and responding to cybersecurity risks and incidents;

(2)  developing and maintaining a cybersecurity risks and incidents curriculum using existing programs and models for training state and local officials and first responders;

 

 

 

 

 

 

 

(3)  providing technical assistance services to support preparedness for and response to cybersecurity risks and incidents;

(4)  conducting cybersecurity training and simulation exercises for state agencies, political subdivisions, and private entities to encourage coordination in defending against and responding to cybersecurity risks and incidents;

(5)  assisting state agencies and political subdivisions in developing cybersecurity information-sharing programs to disseminate information related to cybersecurity risks and incidents; and

(6)  incorporating cybersecurity risk and incident prevention and response methods into existing state and local emergency plans, including continuity of operation plans and incident response plans.

(b)  In implementing the provisions of the agreement prescribed by Subsection (a), the department shall seek to prevent unnecessary duplication of existing programs or efforts of the department or another state agency.

(c)  In selecting an organization under Subsection (a), the department shall consider the organization's previous experience in conducting cybersecurity training and exercises for state agencies and political subdivisions.

(d)  The department shall consult with institutions of higher education in this state when appropriate based on an institution's expertise in addressing specific cybersecurity risks and incidents.

 

SECTION 3.  Subchapter A, Chapter 411, Government Code, is amended by adding Section 411.00431 to read as follows:

Sec. 411.00431.  CYBERSECURITY RISKS AND INCIDENTS.  (a)  The department shall develop a plan to address cybersecurity risks and incidents in this state.  The department may enter into an agreement with a national organization, including the National Cybersecurity Preparedness Consortium, to support the department's efforts in implementing the components of the plan for which the department lacks resources to address internally. 

The agreement may include provisions for:

(1)  providing fee reimbursement for appropriate industry-recognized certification examinations for and

training to state and local officials and first responders preparing for and responding to cybersecurity risks and incidents;

(2)  developing and maintaining a cybersecurity risks and incidents curriculum using existing programs and models for training state and local officials and first responders;

(3)  delivering to state agency personnel with access to state agency networks routine training related to appropriately protecting and maintaining information technology systems and devices, implementing cybersecurity best practices, and mitigating cybersecurity risks and vulnerabilities;

(4)  providing technical assistance services to support preparedness for and response to cybersecurity risks and incidents;

(5)  conducting cybersecurity training and simulation exercises for state agencies, political subdivisions, and private entities to encourage coordination in defending against and responding to cybersecurity risks and incidents;

(6)  assisting state agencies and political subdivisions in developing cybersecurity information-sharing programs to disseminate information related to cybersecurity risks and incidents; and

(7)  incorporating cybersecurity risk and incident prevention and response methods into existing state and local emergency plans, including continuity of operation plans and incident response plans.

(b)  In implementing the provisions of the agreement prescribed by Subsection (a), the department shall seek to prevent unnecessary duplication of existing programs or efforts of the department or another state agency.

(c)  In selecting an organization under Subsection (a), the department shall consider the organization's previous experience in conducting cybersecurity training and exercises for state agencies and political subdivisions.

(d)  The department shall consult with institutions of higher education in this state when appropriate based on an institution's expertise in addressing specific cybersecurity risks and incidents.

 

SECTION 4.  Subchapter B, Chapter 421, Government Code, is amended by adding Section 421.027 to read as follows:

Sec. 421.027.  CYBER ATTACK STUDY AND RESPONSE PLAN.  (a)  In this section,

"cyber attack" means an attempt to damage, disrupt, or gain unauthorized access to a computer, computer network, or computer system.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

(b)  The council shall:

 

(1)  conduct a study regarding cyber attacks on state agencies and on critical infrastructure that is owned, operated, or controlled by agencies; and

 

(2)  develop a state response plan to

 

 

 

 

 

be implemented by an agency in the event of a cyber attack on the agency or on critical infrastructure that is owned, operated, or controlled by the agency.

 

(c)  Not later than September 1, 2018, the council shall deliver the response plan and a report on the findings of the study to:

(1)  the public safety director of the Department of Public Safety;

(2)  the governor;

(3)  the lieutenant governor;

(4)  the speaker of the house of representatives;

(5)  the chair of the committee of the senate having primary jurisdiction over homeland security matters; and

(6)  the chair of the committee of the house of representatives having primary jurisdiction over homeland security matters.

(d)  The response plan required by Subsection (b) and the report required by Subsection (c) are not public information for purposes of Chapter 552.

(e)  This section expires December 1, 2018.

 

SECTION 4.  Subchapter B, Chapter 421, Government Code, is amended by adding Section 421.027 to read as follows:

Sec. 421.027.  CYBER INCIDENT STUDY AND RESPONSE PLAN.  (a)  In this section:

(1)  "Cyber incident" means an event occurring on or conducted through a computer network that actually or imminently jeopardizes the integrity, confidentiality, or availability of computers, information or communications systems or networks, physical or virtual infrastructure controlled by computers or information systems, or information on the computers or systems.  The term includes a vulnerability in implementation or in an information system, system security procedure, or internal control that could be exploited by a threat source.

(2)  "Significant cyber incident" means a cyber incident, or a group of related cyber incidents, likely to result in demonstrable harm to state security interests, foreign relations, or the economy of this state or to the public confidence, civil liberties, or public health and safety of the residents of this state.

(b)  The council, in cooperation with the Department of Information Resources, shall:

(1)  conduct a study regarding cyber incidents and significant cyber incidents affecting state agencies and critical infrastructure that is owned, operated, or controlled by agencies; and

(2)  develop a comprehensive state response plan to provide a format for each state agency to develop an agency-specific response plan and to implement the plan into the agency's information security plan required under Section 2054.133 to

be implemented by the agency in the event of a cyber incident or significant cyber incident affecting the agency or critical infrastructure that is owned, operated, or controlled by the agency.

(c)  Not later than September 1, 2018, the council shall deliver the response plan and a report on the findings of the study to:

(1)  the public safety director of the Department of Public Safety;

(2)  the governor;

(3)  the lieutenant governor;

(4)  the speaker of the house of representatives;

(5)  the chair of the committee of the senate having primary jurisdiction over homeland security matters; and

(6)  the chair of the committee of the house of representatives having primary jurisdiction over homeland security matters.

(d)  The response plan required by Subsection (b) and the report required by Subsection (c) are not public information for purposes of Chapter 552.

(e)  This section expires December 1, 2018.

 

No equivalent provision.

 

SECTION 5.  Section 551.089, Government Code,  is amended to read as follows:

Sec. 551.089.  DELIBERATION REGARDING SECURITY DEVICES OR SECURITY AUDITS; CLOSED MEETING [DEPARTMENT OF INFORMATION RESOURCES].  This chapter does not require a governmental body [the governing board of the Department of Information Resources] to conduct an open meeting to deliberate:

(1)  security assessments or deployments relating to information resources technology;

(2)  network security information as described by Section 2059.055(b); or

(3)  the deployment, or specific occasions for implementation, of security personnel, critical infrastructure, or security devices.

 

No equivalent provision.

 

SECTION 6.  The heading to Section 656.047, Government Code, is amended to read as follows:

Sec. 656.047.  PAYMENT OF PROGRAM AND CERTIFICATION EXAMINATION EXPENSES.

 

No equivalent provision.

 

SECTION 7.  Section 656.047, Government Code, is amended by adding Subsection (a-1) to read as follows:

(a-1)  A state agency may spend public funds as appropriate to reimburse a state agency employee or administrator who serves in an information technology, cybersecurity, or other cyber-related position for fees associated with industry-recognized certification examinations.

 

SECTION 5.  Subchapter C, Chapter 2054, Government Code, is amended by adding Section 2054.0593 to read as follows:

 

Sec. 2054.0593.  CYBERSECURITY TASK FORCE.  (a)  The department shall establish and lead a cybersecurity task force to engage members of the task force in policy discussions and educate state agencies on cybersecurity issues.  The department shall determine the composition of the task force, which may include representatives of state agencies and other interested parties.

 

 

 

 

 

(b)  The task force shall:

(1)  consolidate and synthesize existing cybersecurity resources and best practices to assist state agencies in understanding and implementing cybersecurity measures that are most beneficial to this state;

 

 

 

 

 

 

 

 

(2)  develop reliable, clear, and concise guidelines on cyber threat detection and prevention, including best practices and remediation strategies for state agencies;

(3)  develop state agency guidelines for easily replicated cybersecurity initiatives;

(4)  provide opportunities for state agency technology leaders and members of the legislature to participate in programs and webinars on critical cybersecurity policy issues; and

(5)  provide recommendations to the legislature on any needed legislation to implement cybersecurity best practices and remediation strategies for state agencies.

(c)  The task force is abolished September 1, 2019, unless the department extends the task force until September 1, 2021.

(d)  This section expires September 1, 2021.

SECTION 8.  Subchapter C, Chapter 2054, Government Code, is amended by adding Sections 2054.0593 and 2054.0594 to read as follows:

Sec. 2054.0593.  CYBERSECURITY TASK FORCE.  (a)  The department shall establish and lead a cybersecurity task force to engage members of the task force in policy discussions and educate state agencies on cybersecurity issues.  The department shall determine the composition of the task force, which must include representatives of state agencies, including institutions of higher education, and may include other interested parties.  In selecting representatives from institutions of higher education, the department shall consider selecting members of the Information Technology Council for Higher Education.

(b)  The task force shall:

(1)  consolidate and synthesize existing cybersecurity resources and best practices to assist state agencies in understanding and implementing cybersecurity measures that are most beneficial to this state;

(2)  assess the knowledge, skills, and capabilities of the existing information technology and cybersecurity workforce to mitigate and respond to cyber threats and develop recommendations for addressing immediate workforce deficiencies and ensuring a long-term pool of qualified applicants;

(3)  develop reliable, clear, and concise guidelines on cyber threat detection and prevention, including best practices and remediation strategies for state agencies;

(4)  develop state agency guidelines for easily replicated cybersecurity initiatives;

(5)  provide opportunities for state agency technology leaders and members of the legislature to participate in programs and webinars on critical cybersecurity policy issues; and

(6)  provide recommendations to the legislature on any needed legislation to implement cybersecurity best practices and remediation strategies for state agencies.

(c)  The task force is abolished September 1, 2019, unless the department extends the task force until September 1, 2021.

(d)  This section expires September 1, 2021.

No equivalent provision.

Sec. 2054.0594.  INFORMATION SHARING AND ANALYSIS CENTER.  (a)  The department shall establish an information sharing and analysis center to provide a forum for state agencies to share information regarding cybersecurity threats, best practices, and remediation strategies.

(b)  The department shall appoint persons from appropriate state agencies to serve as representatives to the information sharing and analysis center.

(b-1)  Notwithstanding Subsection (b), the cybersecurity task force established under Section 2054.0593 shall appoint persons to serve as representatives to the information sharing and analysis center until the task force is abolished as provided by that section.  This subsection expires on the date Section 2054.0593 expires.

(c)  The department, using existing resources, shall provide administrative support to the information sharing and analysis center.

 

SECTION 6.  Section 2054.076, Government Code, is amended by adding Subsection (b-1) to read as follows:

(b-1)  The department shall provide mandatory guidelines to state agencies regarding the continuing education requirements for cybersecurity training and certification that must be completed by all information resources employees of the agencies.

 

SECTION 9.  Section 2054.076, Government Code, is amended by adding Subsection (b-1) to read as follows:

(b-1)  The department shall provide mandatory guidelines to state agencies regarding the continuing education requirements for cybersecurity training and the industry-recognized certifications that must be completed by all information resources employees of the agencies.  The department shall consult with the Information Technology Council for Higher Education on applying the guidelines to institutions of higher education.

 

No equivalent provision.

 

SECTION 10.  Sections 2054.077(b) and (e), Government Code, are amended to read as follows:

(b)  The information resources manager of a state agency shall [may] prepare or have prepared a report, including an executive summary of the findings of the report, assessing the extent to which a computer, a computer program, a computer network, a computer system, a printer, an interface to a computer system, including mobile and peripheral devices, computer software, or data processing of the agency or of a contractor of the agency is vulnerable to unauthorized access or harm, including the extent to which the agency's or contractor's electronically stored information is vulnerable to alteration, damage, erasure, or inappropriate use.

(e)  Separate from the executive summary described by Subsection (b), a state agency [whose information resources manager has prepared or has had prepared a vulnerability report] shall prepare a summary of the agency's vulnerability report that does not contain any information the release of which might compromise the security of the state agency's or state agency contractor's computers, computer programs, computer networks, computer systems, printers, interfaces to computer systems, including mobile and peripheral devices, computer software, data processing, or electronically stored information.  The summary is available to the public on request.

 

SECTION 7.  Section 2054.1125(b), Government Code, is amended.

 

SECTION 11. Same as introduced version.

 

 

SECTION 8.  Section 2054.133, Government Code, is amended by adding Subsections (b-1), (b-2), and (b-3) to read as follows:

(b-1)  The executive head and chief information security officer of each state agency shall annually review and approve in writing the agency's information security plan and strategies for addressing the agency's information resources systems that are at highest risk for security breaches.

 

 

 

 

 

 

 

 

(b-2)  Before submitting to the Legislative Budget Board a legislative appropriation request for a state fiscal biennium, a state agency must file with the board the written approval required under Subsection (b-1) for each year of the current state fiscal biennium.

(b-3)  Each state agency shall include in the agency's information security plan the actions the agency is taking to incorporate into the plan the core functions of "identify, protect, detect, respond, and recover" as recommended in the "Framework for Improving Critical Infrastructure Cybersecurity" of the United States Department of Commerce National Institute of Standards and Technology.  The agency shall, at a minimum, identify any information the agency requires individuals to provide to the agency or the agency retains that is not necessary for the agency's operations.  The agency may incorporate the core functions over a period of years.

 

SECTION 12.  Section 2054.133, Government Code, is amended by adding Subsections (b-1), (b-2), (b-3), and (b-4) to read as follows:

(b-1)  The executive head and chief information security officer of each state agency shall annually review and approve in writing the agency's information security plan and strategies for addressing the agency's information resources systems that are at highest risk for security breaches.  If a state agency does not have a chief information security officer, the highest ranking information security employee for the agency shall review and approve the plan and strategies.  The executive head retains full responsibility for the agency's information security and any risks to that security.

(b-2)  Before submitting to the Legislative Budget Board a legislative appropriation request for a state fiscal biennium, a state agency must file with the board the written approval required under Subsection (b-1) for each year of the current state fiscal biennium.

(b-3)  Each state agency shall include in the agency's information security plan the actions the agency is taking to incorporate into the plan the core functions of "identify, protect, detect, respond, and recover" as recommended in the "Framework for Improving Critical Infrastructure Cybersecurity" of the United States Department of Commerce National Institute of Standards and Technology.  The agency shall, at a minimum, identify any information the agency requires individuals to provide to the agency or the agency retains that is not necessary for the agency's operations.  The agency may incorporate the core functions over a period of years.

(b-4)  A state agency's information security plan must include appropriate privacy and security standards that, at a minimum, require a vendor who offers cloud computing services or other software, applications, online services, or information technology solutions to any state agency to demonstrate that data provided by the state to the vendor will be maintained in compliance with all applicable state and federal laws and rules.

 

SECTION 9.  Subchapter N-1, Chapter 2054, Government Code, is amended by adding Sections 2054.515, 2054.516, and 2054.517 to read as follows:

Sec. 2054.515.  INDEPENDENT RISK ASSESSMENT.  (a)  At least once every five years, in accordance with department rules, each state agency shall:

(1)  contract with an independent third party selected from a list provided by the department to conduct an independent risk assessment of the agency's exposure to security risks in the agency's information resources systems; and

 

 

 

(2)  submit the results of the independent risk assessment to the department.

 

 

 

 

 

 

 

 

 

 

 

 

(b)  The department shall submit to the legislature a comprehensive report on the results of the independent risk assessments conducted under Subsection (a)

 

 

that identifies systematic or pervasive security risk vulnerabilities across state agencies and recommendations for addressing the vulnerabilities.

 

 

 

 

Sec. 2054.516.  DATA SECURITY PLAN FOR ONLINE AND MOBILE APPLICATIONS.  (a)  Each state agency

 

implementing an Internet website or mobile application that processes any personally identifiable or confidential information must:

(1)  submit a data security plan to the department before beta testing the website or application; and

 

 

(2)  before deploying the website or application:

(A)  subject the website or application to a vulnerability and penetration test conducted by an independent third party; and

(B)  address any vulnerability identified under Paragraph (A).

(b)  The data security plan required under Subsection (a)(1) must include:

(1)  data flow diagrams to show the location of information in use, in transit, and not in use;

(2)  data storage locations;

(3)  data interaction with online or mobile devices;

(4)  security of data transfer;

(5)  security measures for the online or mobile application; and

(6)  a description of any action taken by the agency to remediate any vulnerability identified by an independent third party under Subsection (a)(2).

 

 

 

 

 

 

 

 

 

 

 

 

 

 

(c)  The department shall review each data security plan submitted under Subsection (a) and make any recommendations for changes to the plan to the state agency as soon as practicable after the department reviews the plan.

 

 

 

 

 

 

No equivalent provision.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Sec. 2054.517.  VENDOR RESPONSIBILITY FOR CYBERSECURITY.  A vendor that contracts with the state to provide information resources technology for a state agency is responsible for addressing

 

 

 

known cybersecurity risks associated with the technology and any

 

 

 

 

 

 

 

 

 

 

 

 

costs associated with addressing the identified cybersecurity risks.

 

SECTION 13.  Subchapter N-1, Chapter 2054, Government Code, is amended by adding Sections 2054.515, 2054.516, 2054.517, and 2054.518 to read as follows:

Sec. 2054.515.  INDEPENDENT RISK ASSESSMENT.  (a)  At least once every five years, in accordance with department rules, each state agency shall:

(1)  contract with an independent third party selected from a list provided by the department to conduct an independent risk assessment of the agency's exposure to security risks in the agency's information resources systems and to conduct tests to practice securing systems and notifying all affected parties in the event of a data breach; and

(2)  submit the results of the independent risk assessment to the department.

(b)  The department annually shall compile the results of the independent risk assessments conducted in the preceding year and prepare:

(1)  a public report on the general security issues covered by the assessments that does not contain any information the release of which may compromise any state agency's information resources system; and

(2)  a confidential report on specific risks and vulnerabilities that is exempt from disclosure under Chapter 552.

(c)  The department annually shall submit to the legislature a comprehensive report on the results of the independent risk assessments conducted under Subsection (a) during the preceding year that includes the report prepared under Subsection (b)(1) and that identifies systematic or pervasive security risk vulnerabilities across state agencies and recommendations for addressing the vulnerabilities but does not contain any information the release of which may compromise any state agency's information resources system.

 

Sec. 2054.516.  DATA SECURITY PLAN FOR ONLINE AND MOBILE APPLICATIONS.  (a)  Each state agency, other than an institution of higher education subject to Section 2054.517, implementing an Internet website or mobile application that processes any personally identifiable or confidential information must:

(1)  submit a data security plan to the department during development and as early as feasible in the testing of the website or application and submit any modification to the plan made during development; and

(2)  before deploying the website or application:

(A)  subject the website or application to a vulnerability and penetration test conducted by an independent third party; and

(B)  address any high priority vulnerability identified under Paragraph (A).

(b)  The data security plan required under Subsection (a)(1) must include:

(1)  data flow diagrams to show the location of information in use, in transit, and not in use;

(2)  data storage locations;

(3)  data interaction with online or mobile devices;

(4)  security of data transfer;

(5)  security measures for the online or mobile application;

(6)  a description of any action taken by the agency to remediate any vulnerability identified by an independent third party under Subsection (a)(2); and

(7)  appropriate privacy and security standards that, at a minimum, require a vendor who offers cloud computing services or other software, applications, online services, or information technology solutions to any state agency to demonstrate that data provided by the state to the vendor will be maintained in compliance with all applicable state and federal laws and rules.

(c)  Unless a state agency has previously submitted a comprehensive security plan approved by the department and has sufficient personnel and technology to review plans internally,

the department shall review each data security plan submitted under Subsection (a) and make any recommendations for changes to the plan to the state agency as soon as practicable after the department reviews the plan.

(d)  A data security plan submitted under Subsection (a) and any recommendation for changes made under Subsection (c) are not public information for purposes of Chapter 552.

 

Sec. 2054.517.  DATA SECURITY PROCEDURES FOR ONLINE AND MOBILE APPLICATIONS OF INSTITUTIONS OF HIGHER EDUCATION.  (a)  Each institution of higher education, as defined by Section 61.003, Education Code, shall adopt and implement a policy for Internet website and mobile application security procedures that complies with this section.

(b)  Before deploying an Internet website or mobile application that processes confidential information for an institution of higher education, the developer of the website or application for the institution must submit to the institution's information security officer the information required under policies adopted by the institution to protect the privacy of individuals by preserving the confidentiality of information processed by the website or application.  At a minimum, the institution's policies must require the developer to submit information describing:

(1)  the architecture of the website or application;

(2)  the authentication mechanism for the website or application; and

(3)  the administrator level access to data included in the website or application.

(c)  Before deploying an Internet website or mobile application described by Subsection (b), an institution of higher education must subject the website or application to a vulnerability and penetration test conducted internally or by an independent third party.

(d)  Each institution of higher education shall submit to the department the policies adopted as required by Subsection (b).  The department shall review the policies and make recommendations for appropriate changes.

 

Sec. 2054.518.  VENDOR RESPONSIBILITY FOR CYBERSECURITY.  A vendor that contracts with this state to provide information resources technology or services for a state agency is responsible for providing to state agency contracting personnel:

(1)  written acknowledgment of any

known cybersecurity risks associated with the technology identified in the vulnerability and penetration test conducted under Section 2054.516;

(2)  proof that any individual servicing the contract holds the appropriate industry-recognized certifications as identified by the National Initiative for Cybersecurity Education;

(3)  a strategy for mitigating any technology or personnel-related cybersecurity risk identified in the vulnerability and penetration test conducted under Section 2054.516; and

(4)  an initial summary of any costs associated with addressing or remediating the identified technology or personnel-related cybersecurity risks.

 

SECTION 10.  Section 2054.575(a), Government Code, is amended to read as follows:

(a)  A state agency shall, with available funds, identify information security issues and develop a plan to prioritize the remediation and mitigation of those issues.  The agency shall include in the plan:

(1)  procedures for reducing the agency's level of exposure with regard to information that alone or in conjunction with other information identifies an individual maintained on a legacy system of the agency; and

(2)  the most cost-effective approach for modernizing, replacing, renewing, or disposing of a legacy system that maintains information critical to the agency's responsibilities.

 

SECTION 14.  Section 2054.575(a), Government Code, is amended to read as follows:

(a)  A state agency shall, with available funds, identify information security issues and develop a plan to prioritize the remediation and mitigation of those issues.  The agency shall include in the plan:

(1)  procedures for reducing the agency's level of exposure with regard to information that alone or in conjunction with other information identifies an individual maintained on a legacy system of the agency;

(2)  the best value approach for modernizing, replacing, renewing, or disposing of a legacy system that maintains information critical to the agency's responsibilities;

(3)  analysis of the percentage of state agency personnel in information technology, cybersecurity, or other cyber-related positions who currently hold the appropriate industry-recognized certifications as identified by the National Initiative for Cybersecurity Education;

(4)  the level of preparedness of state agency cyber personnel and potential personnel who do not hold the appropriate industry-recognized certifications to successfully complete the industry-recognized certification examinations; and

(5)  a strategy for mitigating any workforce-related discrepancy in information technology, cybersecurity, or other cyber-related positions with the appropriate training and industry-recognized certifications.

 

No equivalent provision.

 

SECTION 15.  Section 2059.055(b), Government Code, is amended to read as follows:

(b)  Network security information is confidential under this section if the information is:

(1)  related to passwords, personal identification numbers, access codes, encryption, or other components of the security system of a governmental entity [state agency];

(2)  collected, assembled, or maintained by or for a governmental entity to prevent, detect, or investigate criminal activity; or

(3)  related to an assessment, made by or for a governmental entity or maintained by a governmental entity, of the vulnerability of a network to criminal activity.

 

SECTION 11.  Subtitle B, Title 10, Government Code, is amended by adding Chapter 2061 to read as follows:

CHAPTER 2061. INDIVIDUAL-IDENTIFYING INFORMATION

Sec. 2061.001.  DEFINITION.  In this chapter,

 

 

 

 

"state agency" means a department, commission, board, office, council, authority, or other agency in the executive, legislative, or judicial branch of state government, including a university system or institution of higher education, as defined by Section 61.003, Education Code, that is created by the constitution or a statute of this state.

 

Sec. 2061.002.  DESTRUCTION AUTHORIZED.  (a)  A state agency shall destroy or arrange for the destruction of information that alone or in conjunction with other information identifies an individual if the agency is not required to retain the information under other law.

 

 

(b)  A state agency shall destroy or arrange for the destruction of information described by Subsection (a) by:

(1)  shredding;

(2)  erasing; or

(3)  otherwise modifying the sensitive information in the records to make the information unreadable or indecipherable through any means.

 

SECTION 16.  Subtitle B, Title 10, Government Code, is amended by adding Chapter 2061 to read as follows:

CHAPTER 2061. INDIVIDUAL-IDENTIFYING INFORMATION

Sec. 2061.001.  DEFINITIONS.  In this chapter:

(1)  "Cybersecurity risk" means a material threat of attack, damage, or unauthorized access to the networks, computers, software, or data storage of a state agency.

(2)  "State agency" means a department, commission, board, office, council, authority, or other agency in the executive, legislative, or judicial branch of state government, including a university system or institution of higher education, as defined by Section 61.003, Education Code, that is created by the constitution or a statute of this state.

 

Sec. 2061.002.  DESTRUCTION AUTHORIZED.  (a)  A state agency shall destroy or arrange for the destruction of information that presents a cybersecurity risk and alone or in conjunction with other information identifies an individual if the agency is not required to retain the information for a period of years under other law or for other legal reasons.

(b)  A state agency shall destroy or arrange for the destruction of information described by Subsection (a) in accordance with standards for destruction of data prescribed in the National Security Program Operating Manual, 1995 edition.

 

 

 

(c)  This section does not apply to a record involving criminal activity or a criminal investigation retained for law enforcement purposes.

(d)  Not later than September 1, 2019, each state agency shall develop the systems and policies necessary to comply with this section.  This subsection expires September 1, 2020.

 

SECTION 12.  Section 2157.007, Government Code, is amended by adding Subsection (e) to read as follows:

(e)  The department shall periodically review guidelines on state agency information that may be stored by a cloud computing service and the cloud computing systems

available to state agencies for that storage to ensure that an agency purchasing a major information resources project under Section 2054.118 selects the most affordable, secure, and efficient cloud computing service available to the agency.

 

SECTION 17.  Section 2157.007, Government Code, is amended by adding Subsection (e) to read as follows:

(e)  The department shall periodically review guidelines on state agency information that may be stored by a cloud computing or other storage service and the cloud computing or other storage services available to state agencies for that storage to ensure that an agency purchasing a major information resources project under Section 2054.118 selects the most affordable, secure, and efficient cloud computing or other storage service available to the agency.  The guidelines must include appropriate privacy and security standards that, at a minimum, require a vendor who offers cloud computing or other storage services or other software, applications, online services, or information technology solutions to any state agency to demonstrate that data provided by the state to the vendor will be maintained in compliance with all applicable state and federal laws and rules.

 

SECTION 13.  Chapter 276, Election Code, is amended by adding Section 276.011 to read as follows:

Sec. 276.011.  ELECTION CYBER ATTACK STUDY.  (a)  Not later than December 1, 2018, the Texas Rangers shall

 

conduct a study regarding cyber attacks on election infrastructure and

 

 

 

 

 

 

 

 

shall report its findings

 

 

 

 

 

to the standing committees of the legislature with jurisdiction over election procedures.

The study shall include:

(1)  an investigation of vulnerabilities and risks for a cyber attack against a county's voting system machines or the list of registered voters;

(2)  information on any attempted cyber attack on a county's voting system machines or the list of registered voters; and

(3)  recommendations for protecting a county's voting system machines and list of registered voters from a cyber attack.

 

 

 

 

(b)  This section expires January 1, 2019.

 

SECTION 18.  Chapter 276, Election Code, is amended by adding Section 276.011 to read as follows:

Sec. 276.011.  ELECTION CYBER ATTACK STUDY.  (a)  Not later than December 1, 2018, the secretary of state shall:

(1)  conduct a study regarding cyber attacks on election infrastructure;

(2)  prepare a public summary report on the study's findings that does not contain any information the release of which may compromise any election;

(3)  prepare a confidential report on specific findings and vulnerabilities that is exempt from disclosure under Chapter 552, Government Code; and

(4)  submit a copy of the report required under Subdivision (2) and a general compilation of the report required under Subdivision (3) that does not contain any information the release of which may compromise any election

to the standing committees of the legislature with jurisdiction over election procedures.

(b)  The study must include:

(1)  an investigation of vulnerabilities and risks for a cyber attack against a county's voting system machines or the list of registered voters;

(2)  information on any attempted cyber attack on a county's voting system machines or the list of registered voters; and

(3)  recommendations for protecting a county's voting system machines and list of registered voters from a cyber attack.

(c)  The secretary of state, using existing resources, may contract with a qualified vendor to conduct the study required by this section.

(d)  This section expires January 1, 2019.

 

SECTION 14.  (a)  The lieutenant governor shall establish a Senate Select Committee on Cybersecurity and the speaker of the house of representatives shall establish a House Select Committee on Cybersecurity to, jointly or separately, study:

(1)  cybersecurity in this state;

(2)  the information security plans of each state agency; and

(3)  the risks and vulnerabilities of state agency cybersecurity.

(b)  Not later than November 30, 2017:

(1)  the lieutenant governor shall appoint five senators to the Senate Select Committee on Cybersecurity, one of whom shall be designated as chair; and

(2)  the speaker of the house of representatives shall appoint five state representatives to the House Select Committee on Cybersecurity, one of whom shall be designated as chair.

(c)  The committees established under this section shall convene separately at the call of the chair of the respective committees, or jointly at the call of both chairs.  In joint meetings, the chairs of each committee shall act as joint chairs.

(d)  Following consideration of the issues listed in Subsection (a) of this section, the committees established under this section shall jointly adopt recommendations on state cybersecurity and report in writing to the legislature any findings and adopted recommendations not later than January 13, 2019.

(e)  This section expires September 1, 2019.

 

SECTION 19. Same as introduced version.

 

 

SECTION 15.  (a)  In this section, "state agency" means a board, commission, office, department, council, authority, or other agency in the executive or judicial branch of state government that is created by the constitution or a statute of this state.  The term does not include a university system or institution of higher education as those terms are defined by Section 61.003, Education Code.

(b)  The Department of Information Resources and the Texas State Library and Archives Commission shall conduct a study on state agency digital data storage and records management practices and the associated costs to this state.

(c)  The study required under this section must examine:

(1)  the current digital data storage practices of state agencies in this state;

(2)  the costs associated with those digital data storage practices;

(3)  the digital records management and data classification policies of state agencies and whether the state agencies are consistently complying with the established policies;

(4)  whether the state agencies are storing digital data that exceeds established retention requirements and the cost of that unnecessary storage;

(5)  the adequacy of storage systems used by state agencies to securely maintain confidential digital records; and

(6)  possible solutions and improvements recommended by the state agencies for reducing state costs and increasing security for digital data storage and records management.

(d)  Each state agency shall participate in the study required by this section and provide appropriate assistance and information to the Department of Information Resources and the Texas State Library and Archives Commission.

(e)  Not later than December 1, 2018, the Department of Information Resources and the Texas State Library and Archives Commission shall issue a report on the study required under this section and recommendations for reducing state costs and for improving efficiency in digital data storage and records management to the lieutenant governor, the speaker of the house of representatives, and the appropriate standing committees of the house of representatives and the senate.

(f)  This section expires September 1, 2019.

 

SECTION 20. Same as introduced version.

 

 

SECTION 16.  The changes in law made by this Act do not apply to the Electric Reliability Council of Texas.

 

SECTION 21. Same as introduced version.

 

 

SECTION 17.  This Act takes effect September 1, 2017.

 

SECTION 22. Same as introduced version.