INTRODUCED
|
HOUSE COMMITTEE
SUBSTITUTE
|
SECTION 1. This Act may be
cited as the Texas Cybersecurity Act.
|
SECTION 1. Same as introduced
version.
|
SECTION 2. Section 325.011,
Government Code, is amended to read as follows:
Sec. 325.011. CRITERIA FOR
REVIEW. The commission and its staff shall consider the following criteria
in determining whether a public need exists for the continuation of a state
agency or its advisory committees or for the performance of the functions
of the agency or its advisory committees:
(1) the efficiency and
effectiveness with which the agency or the advisory committee operates;
(2)(A) an identification of
the mission, goals, and objectives intended for the agency or advisory
committee and of the problem or need that the agency or advisory committee
was intended to address; and
(B) the extent to which the
mission, goals, and objectives have been achieved and the problem or need
has been addressed;
(3)(A) an identification of
any activities of the agency in addition to those granted by statute and of
the authority for those activities; and
(B) the extent to which
those activities are needed;
(4) an assessment of
authority of the agency relating to fees, inspections, enforcement, and
penalties;
(5) whether less restrictive
or alternative methods of performing any function that the agency performs
could adequately protect or provide service to the public;
(6) the extent to which the
jurisdiction of the agency and the programs administered by the agency
overlap or duplicate those of other agencies, the extent to which the
agency coordinates with those agencies, and the extent to which the
programs administered by the agency can be consolidated with the programs
of other state agencies;
(7) the promptness and
effectiveness with which the agency addresses complaints concerning
entities or other persons affected by the agency, including an assessment
of the agency's administrative hearings process;
(8) an assessment of the
agency's rulemaking process and the extent to which the agency has
encouraged participation by the public in making its rules and decisions
and the extent to which the public participation has resulted in rules that
benefit the public;
(9) the extent to which the
agency has complied with:
(A) federal and state laws
and applicable rules regarding equality of employment opportunity and the
rights and privacy of individuals; and
(B) state law and applicable
rules of any state agency regarding purchasing guidelines and programs for
historically underutilized businesses;
(10) the extent to which the
agency issues and enforces rules relating to potential conflicts of
interest of its employees;
(11) the extent to which the
agency complies with Chapters 551 and 552 and follows records management
practices that enable the agency to respond efficiently to requests for
public information;
(12) the effect of federal
intervention or loss of federal funds if the agency is abolished; [and]
(13) the extent to which the
purpose and effectiveness of reporting requirements imposed on the agency
justifies the continuation of the requirement; and
(14) an assessment of the
agency's cybersecurity practices.
|
SECTION 2. Section 325.011,
Government Code, is amended to read as follows:
Sec. 325.011. CRITERIA FOR
REVIEW. The commission and its staff shall consider the following criteria
in determining whether a public need exists for the continuation of a state
agency or its advisory committees or for the performance of the functions
of the agency or its advisory committees:
(1) the efficiency and
effectiveness with which the agency or the advisory committee operates;
(2)(A) an identification of
the mission, goals, and objectives intended for the agency or advisory
committee and of the problem or need that the agency or advisory committee
was intended to address; and
(B) the extent to which the
mission, goals, and objectives have been achieved and the problem or need
has been addressed;
(3)(A) an identification of
any activities of the agency in addition to those granted by statute and of
the authority for those activities; and
(B) the extent to which
those activities are needed;
(4) an assessment of
authority of the agency relating to fees, inspections, enforcement, and
penalties;
(5) whether less restrictive
or alternative methods of performing any function that the agency performs
could adequately protect or provide service to the public;
(6) the extent to which the
jurisdiction of the agency and the programs administered by the agency
overlap or duplicate those of other agencies, the extent to which the
agency coordinates with those agencies, and the extent to which the
programs administered by the agency can be consolidated with the programs
of other state agencies;
(7) the promptness and
effectiveness with which the agency addresses complaints concerning
entities or other persons affected by the agency, including an assessment
of the agency's administrative hearings process;
(8) an assessment of the
agency's rulemaking process and the extent to which the agency has
encouraged participation by the public in making its rules and decisions
and the extent to which the public participation has resulted in rules that
benefit the public;
(9) the extent to which the
agency has complied with:
(A) federal and state laws
and applicable rules regarding equality of employment opportunity and the
rights and privacy of individuals; and
(B) state law and applicable
rules of any state agency regarding purchasing guidelines and programs for
historically underutilized businesses;
(10) the extent to which the
agency issues and enforces rules relating to potential conflicts of interest
of its employees;
(11) the extent to which the
agency complies with Chapters 551 and 552 and follows records management
practices that enable the agency to respond efficiently to requests for
public information;
(12) the effect of federal
intervention or loss of federal funds if the agency is abolished; [and]
(13) the extent to which the
purpose and effectiveness of reporting requirements imposed on the agency
justifies the continuation of the requirement; and
(14) an assessment of the
agency's cybersecurity practices using
information available from the Department of Information Resources or any
other appropriate state agency.
|
SECTION 3. Subchapter A,
Chapter 411, Government Code, is amended by adding Section 411.00431 to
read as follows:
Sec. 411.00431.
CYBERSECURITY RISKS AND INCIDENTS.
(a) The department may
enter into an agreement with a national organization, including the
National Cybersecurity Preparedness Consortium, to support the department's
efforts in addressing cybersecurity
risks and incidents in this state.
The agreement may include provisions for:
(1) providing
training to state and
local officials and first responders preparing for and responding to
cybersecurity risks and incidents;
(2) developing and maintaining
a cybersecurity risks and incidents curriculum using existing programs and
models for training state and local officials and first responders;
(3) providing technical
assistance services to support preparedness for and response to cybersecurity
risks and incidents;
(4) conducting
cybersecurity training and simulation exercises for state agencies,
political subdivisions, and private entities to encourage coordination in
defending against and responding to cybersecurity risks and incidents;
(5) assisting state
agencies and political subdivisions in developing cybersecurity
information-sharing programs to disseminate information related to
cybersecurity risks and incidents; and
(6) incorporating
cybersecurity risk and incident prevention and response methods into
existing state and local emergency plans, including continuity of operation
plans and incident response plans.
(b) In implementing the
provisions of the agreement prescribed by Subsection (a), the department
shall seek to prevent unnecessary duplication of existing programs or
efforts of the department or another state agency.
(c) In selecting an
organization under Subsection (a), the department shall consider the
organization's previous experience in conducting cybersecurity training and
exercises for state agencies and political subdivisions.
(d) The department shall
consult with institutions of higher education in this state when
appropriate based on an institution's expertise in addressing specific
cybersecurity risks and incidents.
|
SECTION 3. Subchapter A,
Chapter 411, Government Code, is amended by adding Section 411.00431 to
read as follows:
Sec. 411.00431.
CYBERSECURITY RISKS AND INCIDENTS. (a)
The department shall develop a plan to address cybersecurity risks and incidents
in this state. The department may enter into an agreement with a
national organization, including the National Cybersecurity Preparedness
Consortium, to support the department's efforts in implementing the components of the plan for which the department
lacks resources to address internally.
The agreement may include
provisions for:
(1) providing fee reimbursement for appropriate
industry-recognized certification examinations for and
training to state and
local officials and first responders preparing for and responding to
cybersecurity risks and incidents;
(2) developing and
maintaining a cybersecurity risks and incidents curriculum using existing
programs and models for training state and local officials and first
responders;
(3) delivering to state agency personnel with access to state
agency networks routine training related to appropriately protecting and
maintaining information technology systems and devices, implementing
cybersecurity best practices, and mitigating cybersecurity risks and
vulnerabilities;
(4) providing technical
assistance services to support preparedness for and response to
cybersecurity risks and incidents;
(5) conducting
cybersecurity training and simulation exercises for state agencies,
political subdivisions, and private entities to encourage coordination in
defending against and responding to cybersecurity risks and incidents;
(6) assisting state
agencies and political subdivisions in developing cybersecurity
information-sharing programs to disseminate information related to
cybersecurity risks and incidents; and
(7) incorporating
cybersecurity risk and incident prevention and response methods into
existing state and local emergency plans, including continuity of operation
plans and incident response plans.
(b) In implementing the
provisions of the agreement prescribed by Subsection (a), the department
shall seek to prevent unnecessary duplication of existing programs or
efforts of the department or another state agency.
(c) In selecting an
organization under Subsection (a), the department shall consider the
organization's previous experience in conducting cybersecurity training and
exercises for state agencies and political subdivisions.
(d) The department shall
consult with institutions of higher education in this state when
appropriate based on an institution's expertise in addressing specific
cybersecurity risks and incidents.
|
SECTION 4. Subchapter B,
Chapter 421, Government Code, is amended by adding Section 421.027 to read
as follows:
Sec. 421.027. CYBER
ATTACK STUDY AND RESPONSE PLAN. (a) In this section,
"cyber attack" means an attempt to damage, disrupt, or
gain unauthorized access to a computer, computer network, or computer
system.
(b) The council shall:
(1) conduct a study
regarding cyber attacks on state agencies and on critical infrastructure that is
owned, operated, or controlled by agencies; and
(2) develop a state
response plan to
be implemented by an
agency in the event of a cyber attack on
the agency or on critical infrastructure that is owned, operated, or
controlled by the agency.
(c) Not later than
September 1, 2018, the council shall deliver the response plan and a report
on the findings of the study to:
(1) the public safety
director of the Department of Public Safety;
(2) the governor;
(3) the lieutenant
governor;
(4) the speaker of the
house of representatives;
(5) the chair of the
committee of the senate having primary jurisdiction over homeland security
matters; and
(6) the chair of the
committee of the house of representatives having primary jurisdiction over
homeland security matters.
(d) The response plan
required by Subsection (b) and the report required by Subsection (c) are
not public information for purposes of Chapter 552.
(e) This section expires
December 1, 2018.
|
SECTION 4. Subchapter B,
Chapter 421, Government Code, is amended by adding Section 421.027 to read
as follows:
Sec. 421.027. CYBER
INCIDENT STUDY AND RESPONSE PLAN. (a) In this section:
(1) "Cyber incident" means an event occurring on or
conducted through a computer network that actually or imminently
jeopardizes the integrity, confidentiality, or availability of computers,
information or communications systems or networks, physical or virtual infrastructure
controlled by computers or information systems, or information on the
computers or systems. The term includes a vulnerability in implementation
or in an information system, system security procedure, or internal control
that could be exploited by a threat source.
(2) "Significant cyber incident" means a cyber
incident, or a group of related cyber incidents, likely to result in
demonstrable harm to state security interests, foreign relations, or the
economy of this state or to the public confidence, civil liberties, or
public health and safety of the residents of this state.
(b) The council, in cooperation with the Department of
Information Resources, shall:
(1) conduct a study
regarding cyber incidents and significant cyber incidents
affecting state agencies and critical infrastructure that is owned,
operated, or controlled by agencies; and
(2) develop a comprehensive state response plan to provide a format for each state agency to
develop an agency-specific response plan and to implement the plan into the
agency's information security plan required under Section 2054.133 to
be implemented by the
agency in the event of a cyber incident or
significant cyber incident affecting the agency or critical
infrastructure that is owned, operated, or controlled by the agency.
(c) Not later than
September 1, 2018, the council shall deliver the response plan and a report
on the findings of the study to:
(1) the public safety
director of the Department of Public Safety;
(2) the governor;
(3) the lieutenant
governor;
(4) the speaker of the
house of representatives;
(5) the chair of the
committee of the senate having primary jurisdiction over homeland security
matters; and
(6) the chair of the
committee of the house of representatives having primary jurisdiction over
homeland security matters.
(d) The response plan
required by Subsection (b) and the report required by Subsection (c) are
not public information for purposes of Chapter 552.
(e) This section expires
December 1, 2018.
|
No
equivalent provision.
|
SECTION 5. Section 551.089,
Government Code, is amended to read as follows:
Sec. 551.089. DELIBERATION
REGARDING SECURITY DEVICES OR SECURITY AUDITS; CLOSED MEETING [DEPARTMENT
OF INFORMATION RESOURCES]. This chapter does not require a governmental
body [the governing board of the Department of Information Resources]
to conduct an open meeting to deliberate:
(1) security assessments or
deployments relating to information resources technology;
(2) network security
information as described by Section 2059.055(b); or
(3) the deployment, or
specific occasions for implementation, of security personnel, critical
infrastructure, or security devices.
|
No
equivalent provision.
|
SECTION 6. The heading to
Section 656.047, Government Code, is amended to read as follows:
Sec. 656.047. PAYMENT OF
PROGRAM AND CERTIFICATION EXAMINATION EXPENSES.
|
No
equivalent provision.
|
SECTION 7. Section 656.047,
Government Code, is amended by adding Subsection (a-1) to read as follows:
(a-1) A state agency may
spend public funds as appropriate to reimburse a state agency employee or
administrator who serves in an information technology, cybersecurity, or
other cyber-related position for fees associated with industry-recognized
certification examinations.
|
SECTION 5. Subchapter C,
Chapter 2054, Government Code, is amended by adding Section 2054.0593 to
read as follows:
Sec. 2054.0593.
CYBERSECURITY TASK FORCE. (a) The department shall establish and lead a
cybersecurity task force to engage members of the task force in policy
discussions and educate state agencies on cybersecurity issues. The
department shall determine the composition of the task force, which may include representatives of state
agencies and other interested parties.
(b) The task force shall:
(1) consolidate and
synthesize existing cybersecurity resources and best practices to assist
state agencies in understanding and implementing cybersecurity measures
that are most beneficial to this state;
(2) develop reliable,
clear, and concise guidelines on cyber threat detection and prevention,
including best practices and remediation strategies for state agencies;
(3) develop state agency
guidelines for easily replicated cybersecurity initiatives;
(4) provide opportunities
for state agency technology leaders and members of the legislature to
participate in programs and webinars on critical cybersecurity policy
issues; and
(5) provide
recommendations to the legislature on any needed legislation to implement
cybersecurity best practices and remediation strategies for state agencies.
(c) The task force is
abolished September 1, 2019, unless the department extends the task force
until September 1, 2021.
(d) This section expires
September 1, 2021.
|
SECTION 8. Subchapter C,
Chapter 2054, Government Code, is amended by adding Sections 2054.0593 and
2054.0594 to read as follows:
Sec. 2054.0593.
CYBERSECURITY TASK FORCE. (a) The department shall establish and lead a
cybersecurity task force to engage members of the task force in policy
discussions and educate state agencies on cybersecurity issues. The
department shall determine the composition of the task force, which must include representatives of state
agencies, including institutions of
higher education, and may include
other interested parties. In selecting
representatives from institutions of higher education, the department shall
consider selecting members of the Information Technology Council for Higher
Education.
(b) The task force shall:
(1) consolidate and
synthesize existing cybersecurity resources and best practices to assist
state agencies in understanding and implementing cybersecurity measures
that are most beneficial to this state;
(2) assess the knowledge, skills, and capabilities of the
existing information technology and cybersecurity workforce to mitigate and
respond to cyber threats and develop recommendations for addressing
immediate workforce deficiencies and ensuring a long-term pool of qualified
applicants;
(3) develop reliable,
clear, and concise guidelines on cyber threat detection and prevention,
including best practices and remediation strategies for state agencies;
(4) develop state agency
guidelines for easily replicated cybersecurity initiatives;
(5) provide opportunities
for state agency technology leaders and members of the legislature to
participate in programs and webinars on critical cybersecurity policy
issues; and
(6) provide
recommendations to the legislature on any needed legislation to implement
cybersecurity best practices and remediation strategies for state agencies.
(c) The task force is
abolished September 1, 2019, unless the department extends the task force
until September 1, 2021.
(d) This section expires
September 1, 2021.
|
No
equivalent provision.
|
Sec. 2054.0594.
INFORMATION SHARING AND ANALYSIS CENTER. (a) The department shall
establish an information sharing and analysis center to provide a forum for
state agencies to share information regarding cybersecurity threats, best
practices, and remediation strategies.
(b) The department shall
appoint persons from appropriate state agencies to serve as representatives
to the information sharing and analysis center.
(b-1) Notwithstanding
Subsection (b), the cybersecurity task force established under Section
2054.0593 shall appoint persons to serve as representatives to the
information sharing and analysis center until the task force is abolished
as provided by that section. This subsection expires on the date Section
2054.0593 expires.
(c) The department, using
existing resources, shall provide administrative support to the information
sharing and analysis center.
|
SECTION 6. Section 2054.076,
Government Code, is amended by adding Subsection (b-1) to read as follows:
(b-1) The department
shall provide mandatory guidelines to state agencies regarding the
continuing education requirements for cybersecurity training and certification that must be completed by
all information resources employees of the agencies.
|
SECTION 9. Section 2054.076,
Government Code, is amended by adding Subsection (b-1) to read as follows:
(b-1) The department
shall provide mandatory guidelines to state agencies regarding the
continuing education requirements for cybersecurity training and the industry-recognized certifications
that must be completed by all information resources employees of the
agencies. The department shall consult
with the Information Technology Council for Higher Education on applying
the guidelines to institutions of higher education.
|
No
equivalent provision.
|
SECTION 10. Sections
2054.077(b) and (e), Government Code, are amended to read as follows:
(b) The information resources
manager of a state agency shall [may] prepare or have
prepared a report, including an executive summary of the findings of the
report, assessing the extent to which a computer, a computer program, a
computer network, a computer system, a printer, an interface to a
computer system, including mobile and peripheral devices, computer
software, or data processing of the agency or of a contractor of the agency
is vulnerable to unauthorized access or harm, including the extent to which
the agency's or contractor's electronically stored information is
vulnerable to alteration, damage, erasure, or inappropriate use.
(e) Separate from the
executive summary described by Subsection (b), a state agency [whose
information resources manager has prepared or has had prepared a
vulnerability report] shall prepare a summary of the agency's
vulnerability report that does not contain any information the release
of which might compromise the security of the state agency's or state
agency contractor's computers, computer programs, computer networks,
computer systems, printers, interfaces to computer systems, including
mobile and peripheral devices, computer software, data processing, or
electronically stored information. The summary is available to the public
on request.
|
SECTION 7. Section
2054.1125(b), Government Code, is amended.
|
SECTION 11. Same as
introduced version.
|
SECTION 8. Section 2054.133,
Government Code, is amended by adding Subsections (b-1), (b-2), and (b-3)
to read as follows:
(b-1) The executive head
and chief information security officer of each state agency shall annually
review and approve in writing the agency's information security plan and
strategies for addressing the agency's information resources systems that
are at highest risk for security breaches.
(b-2) Before submitting
to the Legislative Budget Board a legislative appropriation request for a
state fiscal biennium, a state agency must file with the board the written
approval required under Subsection (b-1) for each year of the current state
fiscal biennium.
(b-3) Each state agency
shall include in the agency's information security plan the actions the
agency is taking to incorporate into the plan the core functions of
"identify, protect, detect, respond, and recover" as recommended
in the "Framework for Improving Critical Infrastructure
Cybersecurity" of the United States Department of Commerce National
Institute of Standards and Technology. The agency shall, at a minimum,
identify any information the agency requires individuals to provide to the
agency or the agency retains that is not necessary for the agency's
operations. The agency may incorporate the core functions over a period of
years.
|
SECTION 12. Section
2054.133, Government Code, is amended by adding Subsections (b-1), (b-2),
(b-3), and (b-4) to read as follows:
(b-1) The executive head
and chief information security officer of each state agency shall annually
review and approve in writing the agency's information security plan and
strategies for addressing the agency's information resources systems that
are at highest risk for security breaches. If
a state agency does not have a chief information security officer, the
highest ranking information security employee for the agency shall review and
approve the plan and strategies. The executive head retains full
responsibility for the agency's information security and any risks to that
security.
(b-2) Before submitting
to the Legislative Budget Board a legislative appropriation request for a
state fiscal biennium, a state agency must file with the board the written
approval required under Subsection (b-1) for each year of the current state
fiscal biennium.
(b-3) Each state agency
shall include in the agency's information security plan the actions the
agency is taking to incorporate into the plan the core functions of
"identify, protect, detect, respond, and recover" as recommended
in the "Framework for Improving Critical Infrastructure
Cybersecurity" of the United States Department of Commerce National
Institute of Standards and Technology. The agency shall, at a minimum,
identify any information the agency requires individuals to provide to the
agency or the agency retains that is not necessary for the agency's
operations. The agency may incorporate the core functions over a period of
years.
(b-4) A state agency's information security plan must include
appropriate privacy and security standards that, at a minimum, require a
vendor who offers cloud computing services or other software, applications,
online services, or information technology solutions to any state agency to
demonstrate that data provided by the state to the vendor will be
maintained in compliance with all applicable state and federal laws and
rules.
|
SECTION 9. Subchapter N-1, Chapter
2054, Government Code, is amended by adding Sections 2054.515, 2054.516,
and 2054.517 to read as follows:
Sec. 2054.515.
INDEPENDENT RISK ASSESSMENT. (a) At least once every five years, in
accordance with department rules, each state agency shall:
(1) contract with an
independent third party selected from a list provided by the department to
conduct an independent risk assessment of the agency's exposure to security
risks in the agency's information resources systems; and
(2) submit the results of
the independent risk assessment to the department.
(b) The department shall
submit to the legislature a comprehensive report on the results of the
independent risk assessments conducted under Subsection (a)
that identifies systematic
or pervasive security risk vulnerabilities across state agencies and
recommendations for addressing the vulnerabilities.
Sec. 2054.516. DATA
SECURITY PLAN FOR ONLINE AND MOBILE APPLICATIONS. (a) Each state agency
implementing an Internet
website or mobile application that processes any personally identifiable or
confidential information must:
(1) submit a data
security plan to the department before
beta testing the website or application; and
(2) before deploying the
website or application:
(A) subject the website
or application to a vulnerability and penetration test conducted by an
independent third party; and
(B) address any
vulnerability identified under Paragraph (A).
(b) The data security
plan required under Subsection (a)(1) must include:
(1) data flow diagrams to
show the location of information in use, in transit, and not in use;
(2) data storage
locations;
(3) data interaction with
online or mobile devices;
(4) security of data
transfer;
(5) security measures for
the online or mobile application; and
(6) a description of any
action taken by the agency to remediate any vulnerability identified by an
independent third party under Subsection (a)(2).
(c) The department shall
review each data security plan submitted under Subsection (a) and make any
recommendations for changes to the plan to the state agency as soon as
practicable after the department reviews the plan.
No
equivalent provision.
Sec. 2054.517. VENDOR
RESPONSIBILITY FOR CYBERSECURITY. A vendor that contracts with the state
to provide information resources technology for a state agency is
responsible for addressing
known cybersecurity risks
associated with the technology and any
costs associated with
addressing the identified cybersecurity risks.
|
SECTION 13. Subchapter N-1,
Chapter 2054, Government Code, is amended by adding Sections 2054.515,
2054.516, 2054.517, and 2054.518 to read as follows:
Sec. 2054.515. INDEPENDENT
RISK ASSESSMENT. (a) At least once every five years, in accordance with
department rules, each state agency shall:
(1) contract with an
independent third party selected from a list provided by the department to
conduct an independent risk assessment of the agency's exposure to security
risks in the agency's information resources systems and to conduct tests to practice securing systems and notifying
all affected parties in the event of a data breach; and
(2) submit the results of
the independent risk assessment to the department.
(b) The department annually shall compile the results of the
independent risk assessments conducted in the preceding year and prepare:
(1) a public report on the general security issues covered by
the assessments that does not contain any information the release of which
may compromise any state agency's information resources system; and
(2) a confidential report on specific risks and vulnerabilities
that is exempt from disclosure under Chapter 552.
(c) The department annually shall submit to the
legislature a comprehensive report on the results of the independent risk
assessments conducted under Subsection (a) during
the preceding year that includes the report prepared under Subsection
(b)(1) and that identifies systematic or pervasive security risk
vulnerabilities across state agencies and recommendations for addressing
the vulnerabilities but does not contain
any information the release of which may compromise any state agency's
information resources system.
Sec. 2054.516. DATA
SECURITY PLAN FOR ONLINE AND MOBILE APPLICATIONS. (a) Each state agency, other than an institution of higher education
subject to Section 2054.517, implementing an Internet website or
mobile application that processes any personally identifiable or
confidential information must:
(1) submit a data
security plan to the department during
development and as early as feasible in the testing of the website
or application and submit any
modification to the plan made during development; and
(2) before deploying the
website or application:
(A) subject the website
or application to a vulnerability and penetration test conducted by an
independent third party; and
(B) address any high priority vulnerability identified
under Paragraph (A).
(b) The data security
plan required under Subsection (a)(1) must include:
(1) data flow diagrams to
show the location of information in use, in transit, and not in use;
(2) data storage
locations;
(3) data interaction with
online or mobile devices;
(4) security of data
transfer;
(5) security measures for
the online or mobile application;
(6) a description of any
action taken by the agency to remediate any vulnerability identified by an
independent third party under Subsection (a)(2); and
(7) appropriate privacy and security standards that, at a
minimum, require a vendor who offers cloud computing services or other
software, applications, online services, or information technology
solutions to any state agency to demonstrate that data provided by the state
to the vendor will be maintained in compliance with all applicable state
and federal laws and rules.
(c) Unless a state agency has previously submitted a
comprehensive security plan approved by the department and has sufficient
personnel and technology to review plans internally,
the department shall
review each data security plan submitted under Subsection (a) and make any
recommendations for changes to the plan to the state agency as soon as
practicable after the department reviews the plan.
(d) A data security plan submitted under Subsection (a) and any
recommendation for changes made under Subsection (c) are not public
information for purposes of Chapter 552.
Sec. 2054.517. DATA
SECURITY PROCEDURES FOR ONLINE AND MOBILE APPLICATIONS OF INSTITUTIONS OF
HIGHER EDUCATION. (a) Each institution of higher education, as defined by
Section 61.003, Education Code, shall adopt and implement a policy for
Internet website and mobile application security procedures that complies
with this section.
(b) Before deploying an
Internet website or mobile application that processes confidential
information for an institution of higher education, the developer of the
website or application for the institution must submit to the institution's
information security officer the information required under policies
adopted by the institution to protect the privacy of individuals by
preserving the confidentiality of information processed by the website or
application. At a minimum, the institution's policies must require the
developer to submit information describing:
(1) the architecture of
the website or application;
(2) the authentication
mechanism for the website or application; and
(3) the administrator
level access to data included in the website or application.
(c) Before deploying an
Internet website or mobile application described by Subsection (b), an
institution of higher education must subject the website or application to
a vulnerability and penetration test conducted internally or by an
independent third party.
(d) Each institution of
higher education shall submit to the department the policies adopted as
required by Subsection (b). The department shall review the policies and
make recommendations for appropriate changes.
Sec. 2054.518. VENDOR
RESPONSIBILITY FOR CYBERSECURITY. A vendor that contracts with this state
to provide information resources technology or
services for a state agency is responsible for providing to state agency contracting
personnel:
(1) written acknowledgment of any
known cybersecurity risks
associated with the technology identified
in the vulnerability and penetration test conducted under Section 2054.516;
(2) proof that any individual servicing the contract holds the
appropriate industry-recognized certifications as identified by the
National Initiative for Cybersecurity Education;
(3) a strategy for mitigating any technology or
personnel-related cybersecurity risk identified in the vulnerability and
penetration test conducted under Section 2054.516; and
(4) an initial summary of any costs associated with
addressing or remediating the
identified technology or
personnel-related cybersecurity risks.
|
SECTION 10. Section
2054.575(a), Government Code, is amended to read as follows:
(a) A state agency shall,
with available funds, identify information security issues and develop a
plan to prioritize the remediation and mitigation of those issues. The
agency shall include in the plan:
(1) procedures for
reducing the agency's level of exposure with regard to information that
alone or in conjunction with other information identifies an individual
maintained on a legacy system of the agency; and
(2) the most cost-effective approach for
modernizing, replacing, renewing, or disposing of a legacy system that
maintains information critical to the agency's responsibilities.
|
SECTION 14. Section
2054.575(a), Government Code, is amended to read as follows:
(a) A state agency shall,
with available funds, identify information security issues and develop a
plan to prioritize the remediation and mitigation of those issues. The
agency shall include in the plan:
(1) procedures for
reducing the agency's level of exposure with regard to information that
alone or in conjunction with other information identifies an individual maintained
on a legacy system of the agency;
(2) the best value approach for modernizing,
replacing, renewing, or disposing of a legacy system that maintains
information critical to the agency's responsibilities;
(3) analysis of the percentage of state agency personnel in
information technology, cybersecurity, or other cyber-related positions who
currently hold the appropriate industry-recognized certifications as
identified by the National Initiative for Cybersecurity Education;
(4) the level of preparedness of state agency cyber personnel
and potential personnel who do not hold the appropriate industry-recognized
certifications to successfully complete the industry-recognized
certification examinations; and
(5) a strategy for mitigating any workforce-related discrepancy
in information technology, cybersecurity, or other cyber-related positions
with the appropriate training and industry-recognized certifications.
|
No
equivalent provision.
|
SECTION 15. Section
2059.055(b), Government Code, is amended to read as follows:
(b) Network security
information is confidential under this section if the information is:
(1) related to passwords,
personal identification numbers, access codes, encryption, or other
components of the security system of a governmental entity [state
agency];
(2) collected, assembled, or
maintained by or for a governmental entity to prevent, detect, or
investigate criminal activity; or
(3) related to an
assessment, made by or for a governmental entity or maintained by a
governmental entity, of the vulnerability of a network to criminal
activity.
|
SECTION 11. Subtitle B,
Title 10, Government Code, is amended by adding Chapter 2061 to read as
follows:
CHAPTER 2061.
INDIVIDUAL-IDENTIFYING INFORMATION
Sec. 2061.001.
DEFINITION. In this chapter,
"state agency"
means a department, commission, board, office, council, authority, or other
agency in the executive, legislative, or judicial branch of state
government, including a university system or institution of higher
education, as defined by Section 61.003, Education Code, that is created by
the constitution or a statute of this state.
Sec. 2061.002.
DESTRUCTION AUTHORIZED. (a) A state agency shall destroy or arrange for
the destruction of information that alone or in conjunction with other
information identifies an individual if the agency is not required to
retain the information under other law.
(b) A state agency shall
destroy or arrange for the destruction of information described by
Subsection (a) by:
(1) shredding;
(2) erasing; or
(3) otherwise modifying the sensitive information in the
records to make the information unreadable or indecipherable through any
means.
|
SECTION 16. Subtitle B,
Title 10, Government Code, is amended by adding Chapter 2061 to read as
follows:
CHAPTER 2061.
INDIVIDUAL-IDENTIFYING INFORMATION
Sec. 2061.001.
DEFINITIONS. In this chapter:
(1) "Cybersecurity risk" means a material threat of
attack, damage, or unauthorized access to the networks, computers,
software, or data storage of a state agency.
(2) "State
agency" means a department, commission, board, office, council,
authority, or other agency in the executive, legislative, or judicial
branch of state government, including a university system or institution of
higher education, as defined by Section 61.003, Education Code, that is
created by the constitution or a statute of this state.
Sec. 2061.002.
DESTRUCTION AUTHORIZED. (a) A state agency shall destroy or arrange for
the destruction of information that presents
a cybersecurity risk and alone or in conjunction with other
information identifies an individual if the agency is not required to
retain the information for a period of
years under other law or for
other legal reasons.
(b) A state agency shall
destroy or arrange for the destruction of information described by
Subsection (a) in accordance with
standards for destruction of data prescribed in the National Security
Program Operating Manual, 1995 edition.
(c) This section does not apply to a record involving criminal
activity or a criminal investigation retained for law enforcement purposes.
(d) Not later than September 1, 2019, each state agency shall
develop the systems and policies necessary to comply with this section.
This subsection expires September 1, 2020.
|
SECTION 12. Section
2157.007, Government Code, is amended by adding Subsection (e) to read as
follows:
(e) The department shall
periodically review guidelines on state agency information that may be
stored by a cloud computing service and the cloud computing systems
available to state
agencies for that storage to ensure that an agency purchasing a major
information resources project under Section 2054.118 selects the most
affordable, secure, and efficient cloud computing service available to the agency.
|
SECTION 17. Section
2157.007, Government Code, is amended by adding Subsection (e) to read as
follows:
(e) The department shall
periodically review guidelines on state agency information that may be
stored by a cloud computing or other
storage service and the cloud computing or other storage services available to state agencies for
that storage to ensure that an agency purchasing a major information
resources project under Section 2054.118 selects the most affordable,
secure, and efficient cloud computing or
other storage service available to the agency. The guidelines must include
appropriate privacy and security standards that, at a minimum, require a
vendor who offers cloud computing or other storage services or other
software, applications, online services, or information technology
solutions to any state agency to demonstrate that data provided by the
state to the vendor will be maintained in compliance with all applicable
state and federal laws and rules.
|
SECTION 13. Chapter 276,
Election Code, is amended by adding Section 276.011 to read as follows:
Sec. 276.011. ELECTION
CYBER ATTACK STUDY. (a) Not later than December 1, 2018, the Texas Rangers shall
conduct a study regarding
cyber attacks on election infrastructure and
shall report its findings
to the standing committees
of the legislature with jurisdiction over election procedures.
The study shall include:
(1) an investigation of
vulnerabilities and risks for a cyber attack against a county's voting
system machines or the list of registered voters;
(2) information on any
attempted cyber attack on a county's voting system machines or the list of
registered voters; and
(3) recommendations for
protecting a county's voting system machines and list of registered voters
from a cyber attack.
(b) This section expires
January 1, 2019.
|
SECTION 18. Chapter 276,
Election Code, is amended by adding Section 276.011 to read as follows:
Sec. 276.011. ELECTION
CYBER ATTACK STUDY. (a) Not later than December 1, 2018, the secretary of state shall:
(1) conduct a study
regarding cyber attacks on election infrastructure;
(2) prepare a public summary report on the study's findings
that does not contain any information the release of which may compromise
any election;
(3) prepare a confidential report on specific findings and
vulnerabilities that is exempt from disclosure under Chapter 552,
Government Code; and
(4) submit a copy of the report required under Subdivision (2)
and a general compilation of the report required under Subdivision (3) that
does not contain any information the release of which may compromise any
election
to the standing committees
of the legislature with jurisdiction over election procedures.
(b) The study must
include:
(1) an investigation of
vulnerabilities and risks for a cyber attack against a county's voting
system machines or the list of registered voters;
(2) information on any
attempted cyber attack on a county's voting system machines or the list of
registered voters; and
(3) recommendations for
protecting a county's voting system machines and list of registered voters
from a cyber attack.
(c) The secretary of state, using existing resources, may
contract with a qualified vendor to conduct the study required by this
section.
(d) This section expires
January 1, 2019.
|
SECTION 14. (a) The
lieutenant governor shall establish a Senate Select Committee on
Cybersecurity and the speaker of the house of representatives shall
establish a House Select Committee on Cybersecurity to, jointly or separately,
study:
(1) cybersecurity in this
state;
(2) the information security
plans of each state agency; and
(3) the risks and
vulnerabilities of state agency cybersecurity.
(b) Not later than November
30, 2017:
(1) the lieutenant governor
shall appoint five senators to the Senate Select Committee on
Cybersecurity, one of whom shall be designated as chair; and
(2) the speaker of the house
of representatives shall appoint five state representatives to the House
Select Committee on Cybersecurity, one of whom shall be designated as
chair.
(c) The committees
established under this section shall convene separately at the call of the
chair of the respective committees, or jointly at the call of both chairs.
In joint meetings, the chairs of each committee shall act as joint chairs.
(d) Following consideration
of the issues listed in Subsection (a) of this section, the committees
established under this section shall jointly adopt recommendations on state
cybersecurity and report in writing to the legislature any findings and
adopted recommendations not later than January 13, 2019.
(e) This section expires
September 1, 2019.
|
SECTION 19. Same as
introduced version.
|
SECTION 15. (a) In this
section, "state agency" means a board, commission, office, department,
council, authority, or other agency in the executive or judicial branch of
state government that is created by the constitution or a statute of this
state. The term does not include a university system or institution of
higher education as those terms are defined by Section 61.003, Education
Code.
(b) The Department of
Information Resources and the Texas State Library and Archives Commission
shall conduct a study on state agency digital data storage and records
management practices and the associated costs to this state.
(c) The study required under
this section must examine:
(1) the current digital data
storage practices of state agencies in this state;
(2) the costs associated
with those digital data storage practices;
(3) the digital records
management and data classification policies of state agencies and whether
the state agencies are consistently complying with the established
policies;
(4) whether the state
agencies are storing digital data that exceeds established retention requirements
and the cost of that unnecessary storage;
(5) the adequacy of storage
systems used by state agencies to securely maintain confidential digital
records; and
(6) possible solutions and
improvements recommended by the state agencies for reducing state costs and
increasing security for digital data storage and records management.
(d) Each state agency shall
participate in the study required by this section and provide appropriate
assistance and information to the Department of Information Resources and
the Texas State Library and Archives Commission.
(e) Not later than December
1, 2018, the Department of Information Resources and the Texas State
Library and Archives Commission shall issue a report on the study required
under this section and recommendations for reducing state costs and for
improving efficiency in digital data storage and records management to the
lieutenant governor, the speaker of the house of representatives, and the
appropriate standing committees of the house of representatives and the
senate.
(f) This section expires
September 1, 2019.
|
SECTION 20. Same as
introduced version.
|
SECTION 16. The changes in
law made by this Act do not apply to the Electric Reliability Council of
Texas.
|
SECTION 21. Same as
introduced version.
|
SECTION 17. This Act takes
effect September 1, 2017.
|
SECTION 22. Same as
introduced version.
|
|