By: Capriglione, Elkins, Parker, Dale, Dean, H.B. No. 8
      et al.
 
 
A BILL TO BE ENTITLED
 
AN ACT
  relating to cybersecurity for state agency information resources.
         BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF TEXAS:
         SECTION 1.  This Act may be cited as the Texas Cybersecurity
  Act.
         SECTION 2.  Section 325.011, Government Code, is amended to
  read as follows:
         Sec. 325.011.  CRITERIA FOR REVIEW.  The commission and its
  staff shall consider the following criteria in determining whether
  a public need exists for the continuation of a state agency or its
  advisory committees or for the performance of the functions of the
  agency or its advisory committees:
               (1)  the efficiency and effectiveness with which the
  agency or the advisory committee operates;
               (2)(A)  an identification of the mission, goals, and
  objectives intended for the agency or advisory committee and of the
  problem or need that the agency or advisory committee was intended
  to address; and
                     (B)  the extent to which the mission, goals, and
  objectives have been achieved and the problem or need has been
  addressed;
               (3)(A)  an identification of any activities of the
  agency in addition to those granted by statute and of the authority
  for those activities; and
                     (B)  the extent to which those activities are
  needed;
               (4)  an assessment of authority of the agency relating
  to fees, inspections, enforcement, and penalties;
               (5)  whether less restrictive or alternative methods of
  performing any function that the agency performs could adequately
  protect or provide service to the public;
               (6)  the extent to which the jurisdiction of the agency
  and the programs administered by the agency overlap or duplicate
  those of other agencies, the extent to which the agency coordinates
  with those agencies, and the extent to which the programs
  administered by the agency can be consolidated with the programs of
  other state agencies;
               (7)  the promptness and effectiveness with which the
  agency addresses complaints concerning entities or other persons
  affected by the agency, including an assessment of the agency's
  administrative hearings process;
               (8)  an assessment of the agency's rulemaking process
  and the extent to which the agency has encouraged participation by
  the public in making its rules and decisions and the extent to which
  the public participation has resulted in rules that benefit the
  public;
               (9)  the extent to which the agency has complied with:
                     (A)  federal and state laws and applicable rules
  regarding equality of employment opportunity and the rights and
  privacy of individuals; and
                     (B)  state law and applicable rules of any state
  agency regarding purchasing guidelines and programs for
  historically underutilized businesses;
               (10)  the extent to which the agency issues and
  enforces rules relating to potential conflicts of interest of its
  employees;
               (11)  the extent to which the agency complies with
  Chapters 551 and 552 and follows records management practices that
  enable the agency to respond efficiently to requests for public
  information;
               (12)  the effect of federal intervention or loss of
  federal funds if the agency is abolished; [and]
               (13)  the extent to which the purpose and effectiveness
  of reporting requirements imposed on the agency justifies the
  continuation of the requirement; and
               (14)  an assessment of the agency's cybersecurity
  practices using information available from the Department of
  Information Resources or any other appropriate state agency.
         SECTION 3.  Subchapter B, Chapter 421, Government Code, is
  amended by adding Section 421.027 to read as follows:
         Sec. 421.027.  CYBER INCIDENT STUDY AND RESPONSE PLAN. (a)  
  In this section:
               (1)  "Cyber incident" means an event occurring on or
  conducted through a computer network that actually or imminently
  jeopardizes the integrity, confidentiality, or availability of
  computers, information or communications systems or networks,
  physical or virtual infrastructure controlled by computers or
  information systems, or information on the computers or systems.  
  The term includes a vulnerability in implementation or in an
  information system, system security procedure, or internal control
  that could be exploited by a threat source.
               (2)  "Significant cyber incident" means a cyber
  incident, or a group of related cyber incidents, likely to result in
  demonstrable harm to state security interests, foreign relations,
  or the economy of this state or to the public confidence, civil
  liberties, or public health and safety of the residents of this
  state.
         (b)  The council, in cooperation with the Department of
  Information Resources, shall:
               (1)  conduct a study regarding cyber incidents and
  significant cyber incidents affecting state agencies and critical
  infrastructure that is owned, operated, or controlled by agencies;
  and
               (2)  develop a comprehensive state response plan to
  provide a format for each state agency to develop an
  agency-specific response plan and to implement the plan into the
  agency's information security plan required under Section 2054.133
  to be implemented by the agency in the event of a cyber incident or
  significant cyber incident affecting the agency or critical
  infrastructure that is owned, operated, or controlled by the
  agency.
         (c)  Not later than September 1, 2018, the council shall
  deliver the response plan and a report on the findings of the study
  to:
               (1)  the public safety director of the Department of
  Public Safety;
               (2)  the governor;
               (3)  the lieutenant governor;
               (4)  the speaker of the house of representatives;
               (5)  the chair of the committee of the senate having
  primary jurisdiction over homeland security matters; and
               (6)  the chair of the committee of the house of
  representatives having primary jurisdiction over homeland security
  matters.
         (d)  The response plan required by Subsection (b) and the
  report required by Subsection (c) are not public information for
  purposes of Chapter 552.
         (e)  This section expires December 1, 2018.
         SECTION 4.  Section 551.089, Government Code, is amended to
  read as follows:
         Sec. 551.089.  DELIBERATION REGARDING SECURITY DEVICES OR
  SECURITY AUDITS; CLOSED MEETING [DEPARTMENT OF INFORMATION
  RESOURCES]. This chapter does not require a governmental body [the
  governing board of the Department of Information Resources] to
  conduct an open meeting to deliberate:
               (1)  security assessments or deployments relating to
  information resources technology;
               (2)  network security information as described by
  Section 2059.055(b); or
               (3)  the deployment, or specific occasions for
  implementation, of security personnel, critical infrastructure, or
  security devices.
         SECTION 5.  Section 552.139, Government Code, is amended by
  adding Subsection (d) to read as follows:
         (d)  When posting a contract on an Internet website as
  required by Section 2261.253, a state agency shall redact
  information made confidential by this section or excepted from
  public disclosure by this section. Redaction under this subsection
  does not except information from the requirements of Section
  552.021.
         SECTION 6.  The heading to Section 656.047, Government Code,
  is amended to read as follows:
         Sec. 656.047.  PAYMENT OF PROGRAM AND CERTIFICATION
  EXAMINATION EXPENSES.
         SECTION 7.  Section 656.047, Government Code, is amended by
  adding Subsection (a-1) to read as follows:
         (a-1)  A state agency may spend public funds as appropriate
  to reimburse a state agency employee or administrator who serves in
  an information technology, cybersecurity, or other cyber-related
  position for fees associated with industry-recognized
  certification examinations.
         SECTION 8.  Subchapter C, Chapter 2054, Government Code, is
  amended by adding Section 2054.0594 to read as follows:
         Sec. 2054.0594.  INFORMATION SHARING AND ANALYSIS CENTER.
  (a)  The department shall establish an information sharing and
  analysis center to provide a forum for state agencies to share
  information regarding cybersecurity threats, best practices, and
  remediation strategies.
         (b)  The department shall appoint persons from appropriate
  state agencies to serve as representatives to the information
  sharing and analysis center.
         (c)  The department, using existing resources, shall provide
  administrative support to the information sharing and analysis
  center.
         SECTION 9.  Section 2054.076, Government Code, is amended by
  adding Subsection (b-1) to read as follows:
         (b-1)  The department shall provide mandatory guidelines to
  state agencies regarding the continuing education requirements for
  cybersecurity training and the industry-recognized certifications
  that must be completed by all information resources employees of
  the agencies.  The department shall consult with the Information
  Technology Council for Higher Education on applying the guidelines
  to institutions of higher education.
         SECTION 10.  Sections 2054.077(b) and (e), Government Code,
  are amended to read as follows:
         (b)  The information resources manager of a state agency
  shall [may] prepare or have prepared a report, including an
  executive summary of the findings of the report, assessing the
  extent to which a computer, a computer program, a computer network,
  a computer system, a printer, an interface to a computer system,
  including mobile and peripheral devices, computer software, or data
  processing of the agency or of a contractor of the agency is
  vulnerable to unauthorized access or harm, including the extent to
  which the agency's or contractor's electronically stored
  information is vulnerable to alteration, damage, erasure, or
  inappropriate use.
         (e)  Separate from the executive summary described by
  Subsection (b), a state agency [whose information resources manager
  has prepared or has had prepared a vulnerability report] shall
  prepare a summary of the agency's vulnerability report that does
  not contain any information the release of which might compromise
  the security of the state agency's or state agency contractor's
  computers, computer programs, computer networks, computer systems,
  printers, interfaces to computer systems, including mobile and
  peripheral devices, computer software, data processing, or
  electronically stored information.  The summary is available to
  the public on request.
         SECTION 11.  Section 2054.1125(b), Government Code, is
  amended to read as follows:
         (b)  A state agency that owns, licenses, or maintains
  computerized data that includes sensitive personal information,
  confidential information, or information the disclosure of which is
  regulated by law shall, in the event of a breach or suspected breach
  of system security or an unauthorized exposure of that information:
               (1)  comply[, in the event of a breach of system
  security,] with the notification requirements of Section 521.053,
  Business & Commerce Code, to the same extent as a person who
  conducts business in this state; and
               (2)  not later than 48 hours after the discovery of the
  breach, suspected breach, or unauthorized exposure, notify:
                     (A)  the department, including the chief
  information security officer and the state cybersecurity
  coordinator; or
                     (B)  if the breach, suspected breach, or
  unauthorized exposure involves election data, the secretary of
  state.
         SECTION 12.  Section 2054.133, Government Code, is amended
  by adding Subsections (b-1), (b-2), (b-3), and (b-4) to read as
  follows:
         (b-1)  The executive head and chief information security
  officer of each state agency shall annually review and approve in
  writing the agency's information security plan and strategies for
  addressing the agency's information resources systems that are at
  highest risk for security breaches.  The plan at a minimum must
  include solutions that isolate and segment sensitive information
  and maintain architecturally sound and secured separation among
  networks.  If a state agency does not have a chief information
  security officer, the highest ranking information security
  employee for the agency shall review and approve the plan and
  strategies.  The executive head retains full responsibility for the
  agency's information security and any risks to that security.
         (b-2)  Before submitting to the Legislative Budget Board a
  legislative appropriation request for a state fiscal biennium, a
  state agency must file with the board the written approval required
  under Subsection (b-1) for each year of the current state fiscal
  biennium.
         (b-3)  Each state agency shall include in the agency's
  information security plan the actions the agency is taking to
  incorporate into the plan the core functions of "identify, protect,
  detect, respond, and recover" as recommended in the "Framework for
  Improving Critical Infrastructure Cybersecurity" of the United
  States Department of Commerce National Institute of Standards and
  Technology. The agency shall, at a minimum, identify any
  information the agency requires individuals to provide to the
  agency or the agency retains that is not necessary for the agency's
  operations. The agency may incorporate the core functions over a
  period of years.
         (b-4)  A state agency's information security plan must
  include appropriate privacy and security standards that, at a
  minimum, require a vendor who offers cloud computing services or
  other software, applications, online services, or information
  technology solutions to any state agency to contractually warrant
  that data provided by the state to the vendor will be maintained in
  compliance with all applicable state and federal laws and rules.
         SECTION 13.  Section 2054.512, Government Code, is amended
  to read as follows:
         Sec. 2054.512.  CYBERSECURITY [PRIVATE INDUSTRY-GOVERNMENT]
  COUNCIL.  (a)  The state cybersecurity coordinator shall [may]
  establish and lead a cybersecurity council that includes public and
  private sector leaders and cybersecurity practitioners to
  collaborate on matters of cybersecurity concerning this state.
         (b)  The cybersecurity council must include:
               (1)  one member appointed by the governor;
               (2)  one member of the senate appointed by the
  lieutenant governor;
               (3)  one member of the house of representatives
  appointed by the speaker of the house of representatives; and
               (4)  additional members appointed by the state
  cybersecurity coordinator, including representatives of
  institutions of higher education and private sector leaders.
         (c)  In appointing representatives from institutions of
  higher education to the cybersecurity council, the state
  cybersecurity coordinator shall consider appointing members of the
  Information Technology Council for Higher Education.
         (d)  The cybersecurity council shall provide recommendations
  to the legislature on any legislation necessary to implement
  cybersecurity best practices and remediation strategies for this
  state.
         SECTION 14.  Subchapter N-1, Chapter 2054, Government Code,
  is amended by adding Sections 2054.515, 2054.516, 2054.517,
  2054.518, and 2054.519 to read as follows:
         Sec. 2054.515.  INDEPENDENT RISK ASSESSMENT. (a) At least
  once every five years, in accordance with department rules, each
  state agency shall:
               (1)  contract with an independent third party selected
  from a list provided by the department to conduct an independent
  risk assessment of the agency's exposure to security risks in the
  agency's information resources systems and to conduct tests to
  practice securing systems and notifying all affected parties in the
  event of a data breach; and
               (2)  submit the results of the independent risk
  assessment to the department.
         (b)  The department annually shall compile the results of the
  independent risk assessments conducted in the preceding year and
  prepare:
               (1)  a public report on the general security issues
  covered by the assessments that does not contain any information
  the release of which may compromise any state agency's information
  resources system; and
               (2)  a confidential report on specific risks and
  vulnerabilities that is exempt from disclosure under Chapter 552.
         (c)  The department annually shall submit to the legislature
  a comprehensive report on the results of the independent risk
  assessments conducted under Subsection (a) during the preceding
  year that includes the report prepared under Subsection (b)(1) and
  that identifies systematic or pervasive security risk
  vulnerabilities across state agencies and recommendations for
  addressing the vulnerabilities but does not contain any information
  the release of which may compromise any state agency's information
  resources system.
         Sec. 2054.516.  DATA SECURITY PLAN FOR ONLINE AND MOBILE
  APPLICATIONS. (a) Each state agency, other than an institution of
  higher education subject to Section 2054.517, implementing an
  Internet website or mobile application that processes any
  personally identifiable or confidential information must:
               (1)  submit a data security plan to the department
  during development and as early as feasible in the testing of the
  website or application and submit any modification to the plan made
  during development; and
               (2)  before deploying the website or application:
                     (A)  subject the website or application to a
  vulnerability and penetration test conducted by an independent
  third party; and
                     (B)  address any high priority vulnerability
  identified under Paragraph (A).
         (b)  The data security plan required under Subsection (a)(1)
  must include:
               (1)  data flow diagrams to show the location of
  information in use, in transit, and not in use;
               (2)  data storage locations;
               (3)  data interaction with online or mobile devices;
               (4)  security of data transfer;
               (5)  security measures for the online or mobile
  application;
               (6)  a description of any action taken by the agency to
  remediate any vulnerability identified by an independent third
  party under Subsection (a)(2); and
               (7)  appropriate privacy and security standards that,
  at a minimum, require a vendor who offers cloud computing services
  or other software, applications, online services, or information
  technology solutions to any state agency to demonstrate that data
  provided by the state to the vendor will be maintained in compliance
  with all applicable state and federal laws and rules.
         (c)  Unless a state agency has previously submitted a
  comprehensive security plan approved by the department and has
  sufficient personnel and technology to review plans internally, the
  department shall review each data security plan submitted under
  Subsection (a) and make any recommendations for changes to the plan
  to the state agency as soon as practicable after the department
  reviews the plan.
         (d)  A data security plan submitted under Subsection (a) and
  any recommendation for changes made under Subsection (c) are not
  public information for purposes of Chapter 552.
         Sec. 2054.517.  DATA SECURITY PROCEDURES FOR ONLINE AND
  MOBILE APPLICATIONS OF INSTITUTIONS OF HIGHER EDUCATION. (a)  Each
  institution of higher education, as defined by Section 61.003,
  Education Code, shall adopt and implement a policy for Internet
  website and mobile application security procedures that complies
  with this section.
         (b)  Before deploying an Internet website or mobile
  application that processes confidential information for an
  institution of higher education, the developer of the website or
  application for the institution must submit to the institution's
  information security officer the information required under
  policies adopted by the institution to protect the privacy of
  individuals by preserving the confidentiality of information
  processed by the website or application. At a minimum, the
  institution's policies must require the developer to submit
  information describing:
               (1)  the architecture of the website or application;
               (2)  the authentication mechanism for the website or
  application; and
               (3)  the administrator level access to data included in
  the website or application.
         (c)  Before deploying an Internet website or mobile
  application described by Subsection (b), an institution of higher
  education must subject the website or application to a
  vulnerability and penetration test conducted internally or by an
  independent third party.
         (d)  Each institution of higher education shall submit to the
  department the policies adopted as required by Subsection (b). The
  department shall review the policies and make recommendations for
  appropriate changes.
         Sec. 2054.518.  VENDOR RESPONSIBILITY FOR CYBERSECURITY. A
  vendor that contracts with this state to provide information
  resources technology for a state agency at a cost to the agency of
  $1 million or more is responsible for addressing known
  cybersecurity risks associated with the technology and is
  responsible for any cost associated with addressing the identified
  cybersecurity risks. For a major information resources project,
  the vendor shall provide to state agency contracting personnel:
               (1)  written acknowledgment of any known cybersecurity
  risks associated with the technology identified in the
  vulnerability and penetration test conducted under Section
  2054.516 or Section 2054.517;
               (2)  proof that any individual servicing the contract
  holds the appropriate industry-recognized certifications as
  identified by the National Initiative for Cybersecurity Education;
               (3)  a strategy for mitigating any technology or
  personnel-related cybersecurity risk identified in the
  vulnerability and penetration test conducted under Section
  2054.516 or Section 2054.517; and
               (4)  an initial summary of any costs associated with
  addressing or remediating the identified technology or
  personnel-related cybersecurity risks as identified in
  collaboration with this state following a risk assessment.
         Sec. 2054.519.  CYBERSECURITY RISKS AND INCIDENTS. (a) The
  department shall develop a plan to address cybersecurity risks and
  incidents in this state.  The department may enter into an agreement
  with a national organization, including the National Cybersecurity
  Preparedness Consortium, to support the department's efforts in
  implementing the components of the plan for which the department
  lacks resources to address internally. The agreement may include
  provisions for:
               (1)  providing fee reimbursement for appropriate
  industry-recognized certification examinations for and training to
  state and local officials and first responders preparing for and
  responding to cybersecurity risks and incidents;
               (2)  developing and maintaining a cybersecurity risks
  and incidents curriculum using existing programs and models for
  training state and local officials and first responders;
               (3)  delivering to state agency personnel with access
  to state agency networks routine training related to appropriately
  protecting and maintaining information technology systems and
  devices, implementing cybersecurity best practices, and mitigating
  cybersecurity risks and vulnerabilities;
               (4)  providing technical assistance services to
  support preparedness for and response to cybersecurity risks and
  incidents;
               (5)  conducting cybersecurity training and simulation
  exercises for state agencies, political subdivisions, and private
  entities to encourage coordination in defending against and
  responding to cybersecurity risks and incidents;
               (6)  assisting state agencies and political
  subdivisions in developing cybersecurity information-sharing
  programs to disseminate information related to cybersecurity risks
  and incidents; and
               (7)  incorporating cybersecurity risk and incident
  prevention and response methods into existing state and local
  emergency plans, including continuity of operation plans and
  incident response plans.
         (b)  In implementing the provisions of the agreement
  prescribed by Subsection (a), the department shall seek to prevent
  unnecessary duplication of existing programs or efforts of the
  department or another state agency.
         (c)  In selecting an organization under Subsection (a), the
  department shall consider the organization's previous experience
  in conducting cybersecurity training and exercises for state
  agencies and political subdivisions.
         (d)  The department shall consult with institutions of
  higher education in this state when appropriate based on an
  institution's expertise in addressing specific cybersecurity risks
  and incidents.
         SECTION 15.  Section 2054.575(a), Government Code, is
  amended to read as follows:
         (a)  A state agency shall, with available funds, identify
  information security issues and develop a plan to prioritize the
  remediation and mitigation of those issues. The agency shall
  include in the plan:
               (1)  procedures for reducing the agency's level of
  exposure with regard to information that alone or in conjunction
  with other information identifies an individual maintained on a
  legacy system of the agency;
               (2)  the best value approach for modernizing,
  replacing, renewing, or disposing of a legacy system that maintains
  information critical to the agency's responsibilities;
               (3)  analysis of the percentage of state agency
  personnel in information technology, cybersecurity, or other
  cyber-related positions who currently hold the appropriate
  industry-recognized certifications as identified by the National
  Initiative for Cybersecurity Education;
               (4)  the level of preparedness of state agency cyber
  personnel and potential personnel who do not hold the appropriate
  industry-recognized certifications to successfully complete the
  industry-recognized certification examinations; and
               (5)  a strategy for mitigating any workforce-related
  discrepancy in information technology, cybersecurity, or other
  cyber-related positions with the appropriate training and
  industry-recognized certifications.
         SECTION 16.  Section 2059.055(b), Government Code, is
  amended to read as follows:
         (b)  Network security information is confidential under this
  section if the information is:
               (1)  related to passwords, personal identification
  numbers, access codes, encryption, or other components of the
  security system of a governmental entity [state agency];
               (2)  collected, assembled, or maintained by or for a
  governmental entity to prevent, detect, or investigate criminal
  activity; or
               (3)  related to an assessment, made by or for a
  governmental entity or maintained by a governmental entity, of the
  vulnerability of a network to criminal activity.
         SECTION 17.  Subtitle B, Title 10, Government Code, is
  amended by adding Chapter 2061 to read as follows:
  CHAPTER 2061. INDIVIDUAL-IDENTIFYING INFORMATION
         Sec. 2061.001.  DEFINITIONS. In this chapter:
               (1)  "Cybersecurity risk" means a material threat of
  attack, damage, or unauthorized access to the networks, computers,
  software, or data storage of a state agency.
               (2)  "State agency" means a department, commission,
  board, office, council, authority, or other agency in the
  executive, legislative, or judicial branch of state government,
  including a university system or institution of higher education,
  as defined by Section 61.003, Education Code, that is created by the
  constitution or a statute of this state.
         Sec. 2061.002.  DESTRUCTION AUTHORIZED. (a) A state agency
  shall destroy or arrange for the destruction of information that
  presents a cybersecurity risk and alone or in conjunction with
  other information identifies an individual in connection with the
  agency's networks, computers, software, or data storage if the
  agency is otherwise prohibited by law from retaining the
  information for a period of years.
         (b)  A state agency shall destroy or arrange for the
  destruction of information described by Subsection (a) in
  accordance with standards for destruction of data prescribed in the
  National Security Program Operating Manual, 1995 edition.
         (c)  This section does not apply to a record involving
  criminal activity or a criminal investigation retained for law
  enforcement purposes.
         (d)  A state agency may not destroy or arrange for the
  destruction of any election data before the third anniversary of
  the date the election to which the data pertains is held.
         (e)  A state agency may not under any circumstance sell:
               (1)  a person's precise geographic location
  information;
               (2)  a person's Internet browsing history;
               (3)  a person's application usage history; or
               (4)  the functional equivalent of the information
  described in Subdivisions (1)-(3).
         (f)  Not later than September 1, 2019, each state agency
  shall develop the systems and policies necessary to comply with
  this section.  This subsection expires September 1, 2020.
         SECTION 18.  Section 2157.007, Government Code, is amended
  by adding Subsection (e) to read as follows:
         (e)  The department shall periodically review guidelines on
  state agency information that may be stored by a cloud computing or
  other storage service and the cloud computing or other storage
  services available to state agencies for that storage to ensure
  that an agency purchasing a major information resources project
  under Section 2054.118 selects the most affordable, secure, and
  efficient cloud computing or other storage service available to the
  agency.  The guidelines must include appropriate privacy and
  security standards that, at a minimum, require a vendor who offers
  cloud computing or other storage services or other software,
  applications, online services, or information technology solutions
  to any state agency to demonstrate that data provided by the state
  to the vendor will be maintained in compliance with all applicable
  state and federal laws and rules.
         SECTION 19.  Chapter 276, Election Code, is amended by
  adding Section 276.011 to read as follows:
         Sec. 276.011.  ELECTION CYBER ATTACK STUDY. (a)  Not later
  than December 1, 2018, the secretary of state shall:
               (1)  conduct a study regarding cyber attacks on
  election infrastructure;
               (2)  prepare a public summary report on the study's
  findings that does not contain any information the release of which
  may compromise any election;
               (3)  prepare a confidential report on specific findings
  and vulnerabilities that is exempt from disclosure under Chapter
  552, Government Code; and
               (4)  submit a copy of the report required under
  Subdivision (2) and a general compilation of the report required
  under Subdivision (3) that does not contain any information the
  release of which may compromise any election to the standing
  committees of the legislature with jurisdiction over election
  procedures.
         (b)  The study must include:
               (1)  an investigation of vulnerabilities and risks for
  a cyber attack against a county's voting system machines or the list
  of registered voters;
               (2)  information on any attempted cyber attack on a
  county's voting system machines or the list of registered voters;
  and
               (3)  recommendations for protecting a county's voting
  system machines and list of registered voters from a cyber attack.
         (c)  The secretary of state, using existing resources, may
  contract with a qualified vendor to conduct the study required by
  this section.
         (d)  This section expires January 1, 2019.
         SECTION 20.  (a) The lieutenant governor shall establish a
  Senate Select Committee on Cybersecurity and the speaker of the
  house of representatives shall establish a House Select Committee
  on Cybersecurity to, jointly or separately, study:
               (1)  cybersecurity in this state;
               (2)  the information security plans of each state
  agency; and
               (3)  the risks and vulnerabilities of state agency
  cybersecurity.
         (b)  Not later than November 30, 2017:
               (1)  the lieutenant governor shall appoint five
  senators to the Senate Select Committee on Cybersecurity, one of
  whom shall be designated as chair; and
               (2)  the speaker of the house of representatives shall
  appoint five state representatives to the House Select Committee on
  Cybersecurity, one of whom shall be designated as chair.
         (c)  The committees established under this section shall
  convene separately at the call of the chair of the respective
  committees, or jointly at the call of both chairs. In joint
  meetings, the chairs of each committee shall act as joint chairs.
         (d)  Following consideration of the issues listed in
  Subsection (a) of this section, the committees established under
  this section shall jointly adopt recommendations on state
  cybersecurity and report in writing to the legislature any findings
  and adopted recommendations not later than January 13, 2019.
         (e)  This section expires September 1, 2019.
         SECTION 21.  (a) In this section, "state agency" means a
  board, commission, office, department, council, authority, or
  other agency in the executive or judicial branch of state
  government that is created by the constitution or a statute of this
  state. The term does not include a university system or institution
  of higher education as those terms are defined by Section 61.003,
  Education Code.
         (b)  The Department of Information Resources and the Texas
  State Library and Archives Commission shall conduct a study on
  state agency digital data storage and records management practices
  and the associated costs to this state.
         (c)  The study required under this section must examine:
               (1)  the current digital data storage practices of
  state agencies in this state;
               (2)  the costs associated with those digital data
  storage practices;
               (3)  the digital records management and data
  classification policies of state agencies and whether the state
  agencies are consistently complying with the established policies;
               (4)  whether the state agencies are storing digital
  data that exceeds established retention requirements and the cost
  of that unnecessary storage;
               (5)  the adequacy of storage systems used by state
  agencies to securely maintain confidential digital records;
               (6)  possible solutions and improvements recommended
  by the state agencies for reducing state costs and increasing
  security for digital data storage and records management; and
               (7)  the security level and possible benefits of and
  the cost savings from using cloud computing services for agency
  data storage, data classification, and records management.
         (d)  Each state agency shall participate in the study
  required by this section and provide appropriate assistance and
  information to the Department of Information Resources and the
  Texas State Library and Archives Commission.
         (e)  Not later than December 1, 2018, the Department of
  Information Resources and the Texas State Library and Archives
  Commission shall issue a report on the study required under this
  section and recommendations for reducing state costs and for
  improving efficiency in digital data storage and records management
  to the lieutenant governor, the speaker of the house of
  representatives, and the appropriate standing committees of the
  house of representatives and the senate.
         (f)  This section expires September 1, 2019.
         SECTION 22.  The changes in law made by this Act do not apply
  to the Electric Reliability Council of Texas.
         SECTION 23.  This Act takes effect September 1, 2017.