By: Capriglione, Bohac, Blanco, Shaheen, H.B. No. 4214
      Bernal, et al.
 
 
A BILL TO BE ENTITLED
 
AN ACT
  relating to matters concerning governmental entities, including
  cybersecurity, governmental efficiencies, information resources,
  and emergency planning.
         BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF TEXAS:
         SECTION 1.  Section 37.108(b), Education Code, is amended to
  read as follows:
         (b)  At least once every three years, each school district or
  public junior college district shall conduct a safety and security
  audit of the district's facilities, including an information
  technology cybersecurity assessment. To the extent possible, a
  district shall follow safety and security audit procedures
  developed by the Texas School Safety Center or a comparable public
  or private entity.
         SECTION 2.  Subchapter C, Chapter 61, Education Code, is
  amended by adding Section 61.09092 to read as follows:
         Sec. 61.09092.  COORDINATION OF CYBERSECURITY COURSEWORK
  DEVELOPMENT. (a) In this section, "lower-division institution of
  higher education" means a public junior college, public state
  college, or public technical institute.
         (b)  The board, in consultation with the Department of
  Information Resources, shall coordinate with lower-division
  institutions of higher education and entities that administer or
  award postsecondary industry certifications or other workforce
  credentials in cybersecurity to develop certificate programs or
  other courses of instruction leading toward those certifications or
  credentials that may be offered by lower-division institutions of
  higher education.
         (c)  The board may adopt rules as necessary for the
  administration of this section.
         SECTION 3.  Subchapter F, Chapter 401, Government Code, is
  amended by adding Section 401.106 to read as follows:
         Sec. 401.106.  CHIEF INNOVATION OFFICER. (a) The governor
  shall appoint a chief innovation officer.
         (b)  The chief innovation officer shall:
               (1)  develop procedures and processes to improve
  internal state government efficiency and performance;
               (2)  develop methods to improve the experience of
  residents, businesses, and local governments in interacting with
  state government;
               (3)  in cooperation with the Department of Information
  Resources, increase the use of technology by state agencies to
  improve services provided by the agencies and to reduce state
  expenses and inefficiencies;
               (4)  provide state agency personnel with training in
  skills that support innovation;
               (5)  provide state agency managers with training to
  support innovation and encourage creative thinking; and
               (6)  develop and apply measures to document
  improvements in state government innovation and in employee skills
  that support innovation.
         (c)  In performing the duties required under Subsection (b),
  the chief innovation officer shall:
               (1)  use strategic innovation;
               (2)  promote open innovation;
               (3)  introduce and use group tools and processes that
  encourage creative thinking; and
               (4)  conduct market research to determine the best
  practices for increasing innovation and implement those best
  practices.
         SECTION 4.  Section 418.004(1), Government Code, is amended
  to read as follows:
               (1)  "Disaster" means the occurrence or imminent threat
  of widespread or severe damage, injury, or loss of life or property
  resulting from any natural or man-made cause, including fire,
  flood, earthquake, wind, storm, wave action, oil spill or other
  water contamination, volcanic activity, epidemic, air
  contamination, blight, drought, infestation, explosion, riot,
  hostile military or paramilitary action, extreme heat, cyber
  attack, other public calamity requiring emergency action, or energy
  emergency.
         SECTION 5.  Subchapter B, Chapter 421, Government Code, is
  amended by adding Section 421.027 to read as follows:
         Sec. 421.027.  CYBER INCIDENT STUDY AND RESPONSE PLAN. (a)  
  In this section:
               (1)  "Cyber incident" means an event occurring on or
  conducted through a computer network that actually or imminently
  jeopardizes the integrity, confidentiality, or availability of
  computers, information or communications systems or networks,
  physical or virtual infrastructure controlled by computers or
  information systems, or information on the computers or systems.  
  The term includes a vulnerability in implementation or in an
  information system, system security procedure, or internal control
  that could be exploited by a threat source.
               (2)  "Significant cyber incident" means a cyber
  incident, or a group of related cyber incidents, likely to result in
  demonstrable harm to state security interests, foreign relations,
  or the economy of this state or to the public confidence, civil
  liberties, or public health and safety of the residents of this
  state.
         (b)  The council, in cooperation with the Department of
  Information Resources and the Information Technology Council for
  Higher Education, shall:
               (1)  conduct a study regarding cyber incidents and
  significant cyber incidents affecting state agencies and critical
  infrastructure that is owned, operated, or controlled by agencies;
  and
               (2)  develop a comprehensive state response plan to
  provide a format for each state agency to develop an
  agency-specific response plan and to implement the plan into the
  agency's information security plan required under Section 2054.133
  to be implemented by the agency in the event of a cyber incident or
  significant cyber incident affecting the agency or critical
  infrastructure that is owned, operated, or controlled by the
  agency.
         (c)  Not later than September 1, 2020, the council shall
  deliver the response plan and a report on the findings of the study
  to:
               (1)  the public safety director of the Department of
  Public Safety;
               (2)  the governor;
               (3)  the lieutenant governor;
               (4)  the speaker of the house of representatives;
               (5)  the chair of the committee of the senate having
  primary jurisdiction over homeland security matters; and
               (6)  the chair of the committee of the house of
  representatives having primary jurisdiction over homeland security
  matters.
         (d)  The response plan required by Subsection (b) and the
  report required by Subsection (c) are not public information for
  purposes of Chapter 552.
         (e)  This section expires December 1, 2020.
         SECTION 6.  Subchapter F, Chapter 437, Government Code, is
  amended by adding Section 437.255 to read as follows:
         Sec. 437.255.  ASSISTING TEXAS STATE GUARD WITH CYBER
  OPERATIONS. To serve the state and safeguard the public from
  malicious cyber activity, the governor may command the Texas
  National Guard to assist the Texas State Guard with defending the
  state's cyber operations.
         SECTION 7.  Subchapter C, Chapter 531, Government Code, is
  amended by adding Section 531.1051 to read as follows:
         Sec. 531.1051.  TECHNOLOGY FOR ELIGIBILITY FRAUD
  PREVENTION. (a)  The commission shall use technology to identify
  the risk for fraud associated with applications for health and
  human services program benefits to prevent fraud with respect to
  eligibility determinations for those programs.  To the extent
  allowed by federal law, the commission shall set appropriate
  verification and documentation requirements based on the risk
  identified for particular applications to ensure that commission
  resources are appropriately targeted to maximize fraud reduction
  and accuracy of eligibility determinations.
         (b)  Enhanced eligibility screening tools the commission
  implements for the purposes of this section must use technology
  that provides non-modeled employment and income verification data
  in an automated electronic format.
         SECTION 8.  The heading to Section 656.047, Government Code,
  is amended to read as follows:
         Sec. 656.047.  PAYMENT OF PROGRAM AND CERTIFICATION
  EXAMINATION EXPENSES.
         SECTION 9.  Section 656.047, Government Code, is amended by
  adding Subsection (a-1) to read as follows:
         (a-1)  A state agency may spend public funds as appropriate
  to reimburse a state agency employee or administrator who serves in
  an information technology, cybersecurity, or other cyber-related
  position for fees associated with industry-recognized
  certification examinations.
         SECTION 10.  Chapter 2051, Government Code, is amended by
  adding Subchapter E to read as follows:
  SUBCHAPTER E. UNIFORM ELECTRONIC LEGAL MATERIAL ACT
         Sec. 2051.151.  SHORT TITLE. This subchapter may be cited as
  the Uniform Electronic Legal Material Act.
         Sec. 2051.152.  DEFINITIONS. In this subchapter:
               (1)  "Electronic" means relating to technology having
  electrical, digital, magnetic, wireless, optical, electromagnetic,
  or similar capabilities.
               (2)  "Legal material" means, whether or not in effect:
                     (A)  the constitution of this state;
                     (B)  the general or special laws passed in a
  regular or special session of the Texas Legislature; and
                     (C)  a state agency rule adopted in accordance
  with Chapter 2001.
               (3)  "Official publisher" means:
                     (A)  for legal material described by Subdivision
  (2)(A), the Texas Legislative Council; and
                     (B)  for legal material described by Subdivision
  (2)(B) or (C), the secretary of state.
               (4)  "Publish" means displaying, presenting, or
  releasing to the public, or causing to be displayed, presented, or
  released to the public, legal material by the official publisher.
               (5)  "Record" means information that is inscribed on a
  tangible medium or that is stored in an electronic or other medium
  and is retrievable in perceivable form.
         Sec. 2051.153.  APPLICABILITY. (a) This subchapter applies
  to all legal material in an electronic record that is:
               (1)  designated as official by the official publisher
  under Section 2051.154; and
               (2)  first published electronically by the official
  publisher on or after January 1, 2021.
         (b)  The official publisher is not required to publish legal
  material on or before the date on which the legal material takes
  effect.
         Sec. 2051.154.  LEGAL MATERIAL IN OFFICIAL ELECTRONIC
  RECORD. (a) If the official publisher publishes legal material
  only in an electronic record, the official publisher shall:
               (1)  designate the electronic record as official; and
               (2)  comply with Sections 2051.155, 2051.157, and
  2051.158.
         (b)  If the official publisher publishes legal material in an
  electronic record and also publishes the material in a record other
  than an electronic record, the official publisher may designate the
  electronic record as official if the official publisher complies
  with Sections 2051.155, 2051.157, and 2051.158.
         Sec. 2051.155.  AUTHENTICATION OF OFFICIAL ELECTRONIC
  RECORD. (a) If the official publisher designates an electronic
  record as official in accordance with Section 2051.154, the
  official publisher shall authenticate the record.
         (b)  The official publisher authenticates an electronic
  record by providing a method with which a person viewing the
  electronic record is able to determine that the electronic record
  is unaltered from the official record published by the official
  publisher.
         Sec. 2051.156.  EFFECT OF AUTHENTICATION. (a) Legal
  material in an electronic record that is authenticated as provided
  by Section 2051.155 is presumed to be an accurate copy of the legal
  material.
         (b)  If another state has adopted a law that is substantially
  similar to this subchapter, legal material in an electronic record
  that is authenticated in that state is presumed to be an accurate
  copy of the legal material.
         (c)  A party contesting the authenticity of legal material in
  an electronic record authenticated as provided by Section 2051.155
  has the burden of proving by a preponderance of the evidence that
  the record is not authentic.
         Sec. 2051.157.  PRESERVATION AND SECURITY OF LEGAL MATERIAL
  IN OFFICIAL ELECTRONIC RECORD. (a) The official publisher of legal
  material in an electronic record designated as official in
  accordance with Section 2051.154 shall provide for the preservation
  and security of the record in an electronic form or in a form that is
  not electronic.
         (b)  If legal material is preserved under Subsection (a) in
  an electronic record, the official publisher shall:
               (1)  ensure the integrity of the record;
               (2)  provide for backup and disaster recovery of the
  record; and
               (3)  ensure the continuing usability of the legal
  material in the record.
         Sec. 2051.158.  PUBLIC ACCESS. The official publisher of
  legal material in an electronic record that is required to be
  preserved under Section 2051.157 shall ensure that the material is
  reasonably available for use by the public on a permanent basis.
         Sec. 2051.159.  STANDARDS. In implementing this subchapter,
  the official publisher of legal material in an electronic record
  shall consider:
               (1)  the standards and practices of other
  jurisdictions;
               (2)  the most recent standards regarding
  authentication, preservation, and security of and public access to
  legal material in an electronic record and other electronic
  records, as adopted by national standard-setting bodies;
               (3)  the needs of users of legal material in electronic
  records;
               (4)  the views of governmental officials and entities
  and other interested persons; and
               (5)  to the extent practicable, the methods and
  technologies for the authentication, preservation, and security of
  and public access to legal material that are compatible with the
  methods and technologies used by official publishers in other
  states that have adopted a law that is substantially similar to this
  subchapter.
         Sec. 2051.160.  UNIFORMITY OF APPLICATION AND CONSTRUCTION.
  In applying and construing this subchapter, consideration must be
  given to the need to promote uniformity of the law with respect to
  the subject matter of this subchapter among states that enact a law
  similar to this subchapter.
         Sec. 2051.161.  RELATION TO ELECTRONIC SIGNATURES IN GLOBAL
  AND NATIONAL COMMERCE ACT. This subchapter modifies, limits, and
  supersedes the federal Electronic Signatures in Global and National
  Commerce Act (15 U.S.C. Section 7001 et seq.) but does not modify,
  limit, or supersede Section 101(c) of that Act (15 U.S.C. Section
  7001(c)) or authorize electronic delivery of any of the notices
  described in Section 103(b) of that Act (15 U.S.C. Section
  7003(b)).
         SECTION 11.  Section 2054.059, Government Code, is amended
  to read as follows:
         Sec. 2054.059.  CYBERSECURITY. From available funds, the
  department, in consultation with the Information Technology
  Council for Higher Education, shall:
               (1)  establish and administer a clearinghouse for
  information relating to all aspects of protecting the cybersecurity
  of state agency information;
               (2)  develop strategies and a framework for:
                     (A)  the securing of cyberinfrastructure by state
  agencies, including critical infrastructure; and
                     (B)  cybersecurity risk assessment and mitigation
  planning;
               (3)  develop and provide training to state agencies,
  including training for new employees of state agencies, on
  cybersecurity measures and awareness;
               (4)  provide assistance to state agencies on request
  regarding the strategies and framework developed under Subdivision
  (2); and
               (5)  promote public awareness of cybersecurity issues.
         SECTION 12.  Subchapter C, Chapter 2054, Government Code, is
  amended by adding Section 2054.069 to read as follows:
         Sec. 2054.069.  SECURITY GUIDANCE FOR INTERNET CONNECTIVITY
  OF CERTAIN OBJECTS. (a) The department, in consultation with
  representatives of the information technology industry, voluntary
  standards organizations, the 10 state agencies that received the
  most state appropriations for that state fiscal year as determined
  by the Legislative Budget Board, and the Information Technology
  Council for Higher Education, shall develop comprehensive risk
  management guidance that identifies baseline security features for
  the Internet connectivity of computing devices embedded in objects
  used or purchased by state agencies.
         (b)  In developing the guidance under Subsection (a), the
  department shall identify and use existing international security
  standards and best practices and any known security gaps for a range
  of deployments, including critical systems and consumer usage.
         SECTION 13.  Section 2054.1184, Government Code, is amended
  to read as follows:
         Sec. 2054.1184.  ASSESSMENT OF MAJOR INFORMATION RESOURCES
  PROJECT. (a) A state agency proposing to spend appropriated funds
  for a major information resources project must first conduct an
  evidence-based execution capability assessment using a scoring
  method delivered by an independent third party to:
               (1)  determine the agency's capability for implementing
  the project;
               (2)  reduce the agency's financial risk in implementing
  the project; and
               (3)  increase the probability of the agency's
  successful implementation of the project.
         (b)  A state agency shall submit to the department, the
  quality assurance team established under Section 2054.158, and the
  Legislative Budget Board a detailed report that includes
  measurement and corrective actions for [identifies] the agency's
  operational and technical [organizational] strengths and any
  weaknesses that will be addressed before the agency initially
  spends appropriated funds for a major information resources
  project.
         (c)  Based on project costs, risks, and technical
  difficulty, the department may require a [A] state agency to [may]
  contract with an independent third party to conduct the assessment
  under Subsection (a) and prepare the report described by Subsection
  (b).
         (d)  The department may allow state agencies to purchase an
  execution capability assessment using the purchasing method
  described by Section 2157.068 for commodity items.
         SECTION 14.  Subchapter F, Chapter 2054, Government Code, is
  amended by adding Sections 2054.137, 2054.138, and 2054.139 to read
  as follows:
         Sec. 2054.137.  INFORMATION SECURITY CONTINUOUS MONITORING
  PROGRAM. (a) In this section:
               (1)  "Common control" means a security control that is
  inherited by one or more information resources technologies.
               (2)  "Program" means the information security
  continuous monitoring program described by this section.
         (b)  Each state agency shall:
               (1)  develop and maintain an information security
  continuous monitoring program that:
                     (A)  allows the agency to maintain ongoing
  awareness of the security and vulnerabilities of and threats to the
  agency's information resources;
                     (B)  provides a clear understanding of
  organizational risk and helps the agency set priorities and manage
  the risk consistently;
                     (C)  addresses how the agency conducts ongoing
  authorizations of information resources technologies and the
  environments in which those technologies operate, including the
  agency's use of common controls;
                     (D)  aligns with the continuous monitoring
  guidance, cybersecurity framework, and risk management framework
  published in Special Publications 800-137 and 800-53 by the United
  States Department of Commerce National Institute of Standards and
  Technology;
                     (E)  addresses critical security controls,
  including hardware asset management, software asset management,
  configuration management, and vulnerability management; and
                     (F)  requires the integration of cybersecurity
  products;
               (2)  establish a strategy and plan to implement a
  program for the agency;
               (3)  to the extent practicable, establish information
  security continuous monitoring as an agency-wide solution and
  deploy enterprise information security continuous monitoring
  products and services;
               (4)  submit specified summary-level security-related
  information to the dashboard established under Subsection (c)(3);
               (5)  evaluate and upgrade information resources
  technologies and deploy new products, including agency and
  component information security continuous monitoring dashboards,
  as necessary to support information security continuous monitoring
  and the need to submit security-related information requested by
  the department;
               (6)  require that external service providers hosting
  state information meet state information security requirements for
  information security continuous monitoring; and
               (7)  ensure the agency has adequate staff with the
  necessary training to meet the objectives of the program.
         (c)  The department, in consultation with the Information
  Technology Council for Higher Education, shall:
               (1)  oversee the implementation of this section by each
  state agency;
               (2)  monitor and assist each state agency in
  implementation of a program and related strategies; and
               (3)  establish a summary-level statewide dashboard for
  information security continuous monitoring that provides:
                     (A)  a government-wide view of information
  security continuous monitoring; and 
                     (B)  technical specifications and guidance for
  state agencies on the requirements for submitting information for
  purposes of the dashboard.
         Sec. 2054.138.  CYBERSECURITY THREAT SIMULATION EXERCISES.
  (a) In this section, "executive staff" means the management or
  senior level staff members of a state agency who directly report to
  the executive head of a state agency.
         (b)  The executive head of a state agency and members of the
  executive staff may participate in cybersecurity threat simulation
  exercises with the agency's information resources technologies
  employees to test the cybersecurity capabilities of the agency.
         Sec. 2054.139.  CYBERSECURITY TRAINING FOR NEW EMPLOYEES.
  Not later than the 30th day after the date on which a new employee
  begins employment with a state agency, the employee shall complete
  the cybersecurity training developed by the department under
  Section 2054.059.
         SECTION 15.  Section 2054.512(d), Government Code, is
  amended to read as follows:
         (d)  The cybersecurity council shall:
               (1)  consider the costs and benefits of establishing a
  computer emergency readiness team to address cyber attacks
  occurring in this state during routine and emergency situations;
               (2)  establish criteria and priorities for addressing
  cybersecurity threats to critical state installations;
               (3)  consolidate and synthesize best practices to
  assist state agencies in understanding and implementing
  cybersecurity measures that are most beneficial to this state;
  [and]
               (4)  assess the knowledge, skills, and capabilities of
  the existing information technology and cybersecurity workforce to
  mitigate and respond to cyber threats and develop recommendations
  for addressing immediate workforce deficiencies and ensuring a
  long-term pool of qualified applicants; and
               (5)  ensure all middle and high schools have knowledge
  of and access to:
                     (A)  free cybersecurity courses and curriculum
  approved by the Texas Education Agency;
                     (B)  state and regional information sharing and
  analysis centers; and
                     (C)  contracting benefits, including as provided
  by Section 2054.0565.
         SECTION 16.  Subchapter N-1, Chapter 2054, Government Code,
  is amended by adding Sections 2054.5155, 2054.519, 2054.5191, and
  2054.5192 to read as follows:
         Sec. 2054.5155.  INDEPENDENT RISK ASSESSMENT. (a) At least
  once every five years, in accordance with department rules, each
  state agency shall:
               (1)  contract with an independent third party selected
  from a list provided by the department to conduct an independent
  risk assessment of the agency's exposure to security risks in the
  agency's information resources systems and to conduct tests to
  practice securing systems and notifying all affected parties in the
  event of a data breach; and
               (2)  submit the results of the independent risk
  assessment to the department.
         (b)  The department shall include at least one institution of
  higher education in the list of independent third parties under
  Subsection (a)(1).
         (c)  The department annually shall compile the results of the
  independent risk assessments conducted in the preceding year and
  prepare:
               (1)  a public report on the general security issues
  covered by the assessments that does not contain any information
  the release of which may compromise any state agency's information
  resources system; and
               (2)  a confidential report on specific risks and
  vulnerabilities that is exempt from disclosure under Chapter 552.
         (d)  The department annually shall submit to the legislature
  a comprehensive report on the results of the independent risk
  assessments conducted under Subsection (a) during the preceding
  year that includes the report prepared under Subsection (c)(1) and
  that identifies systematic or pervasive security risk
  vulnerabilities across state agencies and recommendations for
  addressing the vulnerabilities but does not contain any information
  the release of which may compromise any state agency's information
  resources system.
         Sec. 2054.519.  VENDOR RESPONSIBILITY FOR CYBERSECURITY. A
  vendor that contracts with this state to provide information
  resources technology for a state agency at a cost to the agency of
  $1 million or more is responsible for addressing known
  cybersecurity risks associated with the technology and is
  responsible for any cost associated with addressing the identified
  cybersecurity risks. For a major information resources project,
  the vendor shall provide to state agency contracting personnel:
               (1)  a written attestation that:
                     (A)  the vendor has a cybersecurity risk
  management program consistent with:
                           (i)  the cybersecurity framework
  established by the National Institute of Standards and Technology; 
                           (ii)  the 27000 series standards for
  information security published by the International Organization
  for Standardization; or
                           (iii)  other widely accepted security risk
  management frameworks;
                     (B)  the vendor's cybersecurity risk management
  program includes appropriate training and certifications for the
  employees performing work under the contract; and
                     (C)  the vendor has a vulnerability management
  program that addresses vulnerability identification, mitigation,
  and responsible disclosure, as appropriate; and
               (2)  an initial summary of any costs associated with
  addressing or remediating the identified technology or
  personnel-related cybersecurity risks as identified in
  collaboration with this state following a risk assessment.
         Sec. 2054.5191.  CYBERSTAR PROGRAM; CERTIFICATE OF
  APPROVAL. (a)  The state cybersecurity coordinator, in
  collaboration with the cybersecurity council and public and private
  entities in this state, shall develop best practices for
  cybersecurity that include:
               (1)  measureable, flexible, and voluntary
  cybersecurity risk management programs for public and private
  entities to adopt to prepare for and respond to cyber incidents that
  compromise the confidentiality, integrity, and availability of the
  entities' information systems;
               (2)  appropriate training and information for
  employees or other individuals who are most responsible for
  maintaining security of the entities' information systems;
               (3)  consistency with:
                     (A)  for a municipality or county, the multihazard
  emergency operations plan and the safety and security audit
  required under Section 364.0101, Local Government Code; and
                     (B)  the National Institute of Standards and
  Technology standards for cybersecurity;
               (4)  public service announcements to encourage
  cybersecurity awareness; and
               (5)  coordination with local and state governmental
  entities.
         (b)  The state cybersecurity coordinator shall establish a
  cyberstar certificate program to recognize public and private
  entities that implement the best practices for cybersecurity
  developed in accordance with Subsection (a). The program must
  allow a public or private entity to submit to the department a form
  certifying that the entity has complied with the best practices and
  the department to issue a certificate of approval to the entity.
  The entity may include the certificate of approval in
  advertisements and other public communications.
         (c)  The state cybersecurity coordinator shall conduct an
  annual public event to promote best practices for cybersecurity.
         Sec. 2054.5192.  ENCRYPTED SECURE LAYER SERVICES REQUIRED.
  Each state agency that maintains a publicly accessible Internet
  website that requires the submission of sensitive personally
  identifiable information shall use an encrypted secure
  communication protocol, including a secure hypertext transfer
  protocol.
         SECTION 17.  Subchapter Q, Chapter 2054, Government Code, is
  amended by adding Section 2054.577 to read as follows:
         Sec. 2054.577.  TEXAS INNOVATION FUND AND STATE AGENCY
  TECHNOLOGY UPGRADES ACCOUNT. (a) In this section:
               (1)  "Account" means the state agency technology
  upgrades account.
               (2)  "Board" means the Texas innovation fund board.
               (3)  "Cloud computing service" has the meaning assigned
  by Section 2157.007.
               (4)  "Device-as-a-service" means a managed service in
  which hardware that belongs to a managed service provider is
  installed at a state agency and a service level agreement defines
  the responsibilities of each party to the agreement.
               (5)  "Fund" means the Texas innovation fund.
               (6)  "Information technology system" means any
  equipment or interconnected system or subsystem of equipment used
  by a state agency, or a person under a contract with a state agency
  if the contract requires use of the equipment, to acquire, store,
  analyze, evaluate, manipulate, manage, move, control, display,
  switch, interchange, transmit, print, copy, scan, or receive data
  or other information. The term:
                     (A)  includes a computer, a device-as-a-service
  solution, ancillary computer equipment such as imaging, printing,
  scanning, and copying peripherals and input, output, and storage
  devices necessary for security and surveillance, peripheral
  equipment designed to be controlled by the central processing unit
  of a computer, software and firmware and similar procedures, and
  services, including support services, and related resources; and
                     (B)  does not include equipment acquired by a
  contractor incidental to a state contract.
               (7)  "Legacy information technology system" means an
  information technology system that is operated with obsolete or
  inefficient hardware or software technology.
               (8)  "Qualifying information technology modernization
  project" means a project by a state agency to:
                     (A)  replace the agency's information technology
  systems;
                     (B)  transition the agency's legacy information
  technology systems to a cloud computing service or other innovative
  commercial platform or technology; or
                     (C)  develop and implement a method to provide
  adequate, risk-based, and cost-effective information technology
  responses to threats to the agency's information security.
               (9)  "State agency" has the meaning assigned by Section
  2254.151, notwithstanding Section 2054.003.
         (b)  The Texas innovation fund board is established to
  administer the Texas innovation fund and the state agency
  technology upgrades account and to make awards of financial
  assistance to state agencies from the fund or account for
  qualifying information technology modernization projects. The
  board is composed of:
               (1)  one member who is a representative of the
  department, appointed by the presiding officer of the governing
  board of the department;
               (2)  one member who is a representative of the office of
  the governor, appointed by the governor;
               (3)  two members of the senate, appointed by the
  lieutenant governor;
               (4)  two members of the house of representatives,
  appointed by the presiding officer of the governing board of the
  department from a list provided by the speaker of the house of
  representatives; and
               (5)  one public member, appointed by the governor.
         (c)  Members of the board serve staggered six-year terms. A
  board member is not entitled to compensation for service on the
  board but is entitled to reimbursement of expenses incurred while
  performing duties as a board member.
         (d)  The Texas innovation fund and the state agency
  technology upgrades account are special funds outside the state
  treasury to be used by the board, without further legislative
  appropriation, as provided by this section.
         (e)  The fund consists of:
               (1)  money appropriated, credited, or transferred to
  the fund by the legislature;
               (2)  money received by the board for the repayment of a
  loan made from the fund; and
               (3)  interest and other earnings earned on deposits and
  investments of money in the fund.
         (f)  The account consists of:
               (1)  money deposited to the account by the comptroller
  in the manner prescribed by Subsection (h); and
               (2)  interest and other earnings earned on deposits and
  investments of money in the account.
         (g)  The department by rule shall establish a loan program to
  authorize the board to use money from the fund to provide loans to
  state agencies for qualifying information technology modernization
  projects. A state agency must apply to the board for a loan from the
  fund. The application must include a description of the qualifying
  information technology modernization project for which the state
  agency is requesting a loan. A loan agreement entered into under
  this subsection must require the state agency to:
               (1)  repay the loan to the board within seven years of
  the date the loan is made to the agency; and
               (2)  make annual reports to the board identifying cost
  savings realized by the agency as a result of the project for which
  the agency received the loan.
         (h)  At the end of each state fiscal year, on the written
  request of a state agency, the comptroller shall deposit to the
  account the unexpended balance of any money appropriated to the
  agency for that state fiscal year that is budgeted by the agency for
  information technology services or cybersecurity purposes. A state
  agency may request money from the account from the board at any time
  for a qualifying information technology modernization project.
  This subsection does not apply to the unexpended balance of any
  money appropriated to a state agency from federal funds or from a
  fund created by the constitution of this state.
         (i)  The comptroller shall separately account for the amount
  of money deposited to the account at the request of each state
  agency under Subsection (h). Money deposited to the account under
  Subsection (h) and any interest and other earnings on that money may
  be provided only to the state agency for which the comptroller
  deposited the money to the account and may be used by the agency
  only for a qualifying information technology modernization
  project.
         (j)  Any money deposited to the account at the request of a
  state agency under Subsection (h) that is not requested by the
  agency within two years from the date the money is deposited shall
  be transferred by the comptroller to the general revenue fund to be
  used in accordance with legislative appropriation.
         (k)  A state agency that receives money from the fund or the
  account may collaborate with one or more other state agencies that
  also receive money from the fund or the account to purchase
  information technology systems that may be shared between the
  agencies.
         (l)  The department and the comptroller may adopt rules to
  implement and administer this section.
         SECTION 18.  Chapter 2054, Government Code, is amended by
  adding Subchapter R to read as follows:
  SUBCHAPTER R. INFORMATION RESOURCES OF GOVERNMENTAL ENTITIES
         Sec. 2054.601.  USE OF NEXT GENERATION TECHNOLOGY. Each
  state agency and local government shall, in the administration of
  the agency or local government, consider using next generation
  technologies, including cryptocurrency, blockchain technology, and
  artificial intelligence.
         Sec. 2054.602.  LIABILITY EXEMPTION. A person who in good
  faith discloses to a state agency or other governmental entity
  information regarding a potential security issue with respect to
  the agency's or entity's information resources technologies is not
  liable for any civil damages resulting from disclosing the
  information unless the person stole, retained, or sold any data
  obtained as a result of the security issue.
         Sec. 2054.603.  MATCHING GRANTS FOR LOCAL CYBERSECURITY
  PROJECTS. (a) In this section, "local governmental entity" means a
  political subdivision of the state, including a:
               (1)  county;
               (2)  municipality;
               (3)  public school district; or
               (4)  special-purpose district or authority.
         (b)  Using available funds, the governor shall establish and
  administer a cybersecurity matching grant program to award grants
  to local governmental entities to defray the costs of cybersecurity
  projects.
         (c)  A local governmental entity that applies to the office
  of the governor for a matching grant under this section must
  identify the source and amount of the local governmental entity's
  matching funds. If the office approves a grant application, the
  office shall award to the local governmental entity a grant amount
  equal to 150 percent of the amount committed by the entity.
         (d)  The office may set a deadline for grant applications for
  each state fiscal year.
         (e)  The governor shall adopt rules to implement the grant
  program created under this section.
         Sec. 2054.604.  CYBERSECURITY THREAT ASSESSMENT. The
  department shall develop a cybersecurity threat assessment for
  local governments that provides best practices for preventing
  cybersecurity attacks.
         Sec. 2054.605.  REPOSITORY FOR CYBERSECURITY EDUCATION AND
  TRAINING. The department, in conjunction with institutions of
  higher education as defined by Section 61.003, Education Code,
  shall maintain and promote a centralized repository of information
  on cybersecurity education and training that is available to any
  governmental entity in this state.
         SECTION 19.  Subchapter B, Chapter 2155, Government Code, is
  amended by adding Section 2155.092 to read as follows:
         Sec. 2155.092.  VENDOR STATEMENT FOR CERTAIN GOODS. (a)  
  This section does not apply to a good provided as part of a major
  information resources project as defined by Section 2054.003.
         (b)  A vendor offering to sell to the state a good embedded
  with a computing device capable of Internet connectivity must
  include with each bid, offer, proposal, or other expression of
  interest a written statement providing whether, at the time of
  submitting the bid, offer, proposal, or expression of interest, the
  vendor has actual knowledge of a confirmed security vulnerability
  or defect in the device's hardware, software, or firmware that
  would adversely affect the security of state data and is subject to
  an applicable notification law.
         (c)  If a security vulnerability or defect is identified by a
  vendor under Subsection (b), the contracting state agency may
  request additional information in order to assess:
               (1)  the potential impact of the vulnerability or
  defect on the agency's planned use of the device; and
               (2)  whether a security patch or other means of
  mitigation is currently available or expected within a specific
  period of time.
         SECTION 20.  The heading to Section 2157.007, Government
  Code, is amended to read as follows:
         Sec. 2157.007.  [CONSIDERATION OF] CLOUD COMPUTING SERVICE
  [PURCHASE].
         SECTION 21.  Section 2157.007, Government Code, is amended
  by amending Subsections (a) and (b) and adding Subsections (b-1),
  (b-2), and (f) to read as follows:
         (a)  In this section:
               (1)  "Cloud computing service" has the meaning assigned
  by Special Publication 800-145 issued by the United States
  Department of Commerce National Institute of Standards and
  Technology, as the definition existed on January 1, 2015.
               (2)  "Major information resources project" has the
  meaning assigned by Section 2054.003.
         (b)  Except as provided by Subsection (b-1), a [A] state
  agency shall ensure [consider cloud computing service options,
  including any security benefits and cost savings associated with
  purchasing those service options from a cloud computing service
  provider and from a statewide technology center established by the
  department], when making purchases for an automated information
  system or a major information resources project, that the system or
  project is capable of being deployed and run on cloud computing
  services [under Section 2054.118].
         (b-1)  When making a purchase for an automated information
  system or a major information resources project, a state agency may
  determine that, due to integration limitations with legacy systems,
  security risks, costs, or other relevant considerations, the agency
  is unable to purchase a system or project capable of being deployed
  and run on cloud computing services.
         (b-2)  At least 14 days before the date a state agency
  solicits bids, proposals, offers, or other applicable expressions
  of interest for a purchase described by Subsection (b-1), the
  agency shall submit to the Legislative Budget Board for the
  purchase of an automated information system or to the quality
  assurance team as defined by Section 2054.003 for the purchase of a
  major information resources project a report that describes the
  purchase and the agency's reasoning for making the purchase.
         (f)  The department shall periodically review guidelines on
  state agency information that may be stored by a cloud computing or
  other storage service and the cloud computing or other storage
  services available to state agencies for that storage to ensure
  that an agency purchasing a major information resources project
  selects the most affordable, secure, and efficient cloud computing
  or other storage service available to the agency.  The guidelines
  must include appropriate privacy and security standards that, at a
  minimum, require a vendor who offers cloud computing or other
  storage services or other software, applications, online services,
  or information technology solutions to any state agency to
  demonstrate that data provided by the state to the vendor will be
  maintained in compliance with all applicable state and federal laws
  and rules.
         SECTION 22.  Section 205.010(b), Local Government Code, is
  amended to read as follows:
         (b)  A local government that owns, licenses, or maintains
  computerized data that includes sensitive personal information
  shall comply, in the event of a breach of system security, with the
  notification requirements of:
               (1)  Section 364.0053;
               (2)  Section 364.0102; and
               (3)  Section 521.053, Business & Commerce Code, to the
  same extent as a person who conducts business in this state.
         SECTION 23.  Subtitle C, Title 11, Local Government Code, is
  amended by adding Chapter 364 to read as follows:
  CHAPTER 364. LOCAL GOVERNMENT CYBERSECURITY AND EMERGENCY PLANNING
  AND RESPONSE
  SUBCHAPTER A. GENERAL PROVISIONS
         Sec. 364.0001.  DEFINITIONS. In this chapter:
               (1)  "Breach of system security" has the meaning
  assigned by Section 521.053, Business & Commerce Code.
               (2)  "Cybersecurity coordinator" means the state
  cybersecurity coordinator designated under Section 2054.511,
  Government Code.
               (3)  "Cybersecurity council" means the council
  established by the cybersecurity coordinator under Section
  2054.512, Government Code.
               (4)  "Sensitive personal information" has the meaning
  assigned by Section 521.002, Business & Commerce Code.
  SUBCHAPTER B. REGIONAL INFORMATION SHARING AND ANALYSIS CENTERS
         Sec. 364.0051.  ESTABLISHMENT. (a)  The cybersecurity
  coordinator shall provide for the establishment and operation of
  not more than 20 regional information sharing and analysis centers.
         (b)  Regional information sharing and analysis centers shall
  be located throughout the state so that the boundaries for each
  center are coextensive with the regional education service centers
  established under Chapter 8, Education Code.
         Sec. 364.0052.  MEMBERSHIP. Each municipality with a
  population of more than 25,000 shall join the regional information
  sharing and analysis center in which the municipality is
  predominantly located.  Any other political subdivision may join
  the regional information sharing and analysis center in which the
  political subdivision is predominantly located.
         Sec. 364.0053.  SECURITY BREACH NOTIFICATION. (a)  Not
  later than 48 hours after a political subdivision discovers a
  breach or suspected breach of system security or an unauthorized
  exposure of sensitive personal information, the political
  subdivision shall notify the regional information sharing and
  analysis center of the breach.  The notification must describe the
  breach, suspected breach, or unauthorized exposure.
         (b)  A regional information sharing and analysis center
  shall report to the Department of Information Resources any breach
  of system security reported by a political subdivision in which the
  person responsible for the breach:
               (1)  obtained or modified specific critical or
  sensitive personal information;
               (2)  established access to the political subdivision's
  information systems or infrastructure; or
               (3)  undermined, severely disrupted, or destroyed a
  core service, program, or function of the political subdivision, or
  placed the person in a position to do so in the future.
         Sec. 364.0054.  RULEMAKING. The cybersecurity coordinator
  may adopt rules necessary to implement this subchapter.
  SUBCHAPTER C. EMERGENCY PLANNING AND RESPONSE
         Sec. 364.0101.  MULTIHAZARD EMERGENCY OPERATIONS PLAN;
  SAFETY AND SECURITY AUDIT. (a)  This section applies to a
  municipality or county with a population of more than 100,000.
         (b)  Each municipality and county shall adopt and implement a
  multihazard emergency operations plan for use in the municipality's
  and county's facilities. The plan must address mitigation,
  preparedness, response, and recovery as determined by the
  cybersecurity council and the governor's office of homeland
  security. The plan must provide for:
               (1)  municipal or county employee training in
  responding to an emergency;
               (2)  measures to ensure coordination with the
  Department of State Health Services, Department of Information
  Resources, local emergency management agencies, law enforcement
  agencies, local health departments, and fire departments in the
  event of an emergency; and
               (3)  the implementation of a safety and security audit
  as required by Subsection (c).
         (c)  At least once every three years, each municipality and
  county shall conduct a safety and security audit of the
  municipality's or county's information technology infrastructure.
  To the extent possible, a municipality or county shall follow
  safety and security audit procedures developed by the cybersecurity
  council or a comparable public or private entity.
         (d)  A municipality or county shall report the results of the
  safety and security audit conducted under Subsection (c):
               (1)  to the municipality's or county's governing body;
  and
               (2)  in the manner required by the cybersecurity
  council, to the cybersecurity council.
         (e)  Except as provided by Subsection (f), any document or
  information collected, developed, or produced during a safety and
  security audit conducted under Subsection (c) is not subject to
  disclosure under Chapter 552, Government Code.
         (f)  A document relating to a municipality's or county's
  multihazard emergency operations plan is subject to disclosure if
  the document enables a person to:
               (1)  verify that the municipality or county has
  established a plan and determine the agencies involved in the
  development of the plan and the agencies coordinating with the
  municipality or county to respond to an emergency;
               (2)  verify that the municipality's or county's plan
  was reviewed within the last 12 months and determine the specific
  review dates;
               (3)  verify that the plan addresses the phases of
  emergency management under Subsection (b);
               (4)  verify that municipal or county employees have
  been trained to respond to an emergency and determine the types of
  training, the number of employees trained, and the person
  conducting the training;
               (5)  verify that the municipality or county has
  completed a safety and security audit under Subsection (c) and
  determine the date the audit was conducted, the person conducting
  the audit, and the date the municipality or county presented the
  results of the audit to the municipality's or county's governing
  body; and
               (6)  verify that the municipality or county has
  addressed any recommendations by the municipality's or county's
  governing body for improvement of the plan and determine the
  municipality's or county's progress within the last 12 months.
         Sec. 364.0102.  RANSOMWARE PAYMENT. (a) In this section,
  "ransomware" has the meaning assigned by Section 33.023, Penal
  Code.
         (b)  Not later than 48 hours after the time a political
  subdivision makes a ransomware payment, the political subdivision
  shall notify the cybersecurity coordinator of the payment.
         SECTION 24.  Section 2054.513, Government Code, is repealed.
         SECTION 25.  The Department of Information Resources shall
  conduct a study on the types of objects embedded with computing
  devices that are connected to the Internet that are purchased
  through the department. The Department of Information Resources
  shall submit a report on the study to the legislature not later than
  December 31, 2020.
         SECTION 26.  (a) The lieutenant governor shall establish a
  Senate Select Committee on Cybersecurity and the speaker of the
  house of representatives shall establish a House Select Committee
  on Cybersecurity to, jointly or separately, study:
               (1)  cybersecurity in this state;
               (2)  the information security plans of each state
  agency;
               (3)  the risks and vulnerabilities of state agency
  cybersecurity; and
               (4)  information technology procurement.
         (b)  Not later than November 30, 2019:
               (1)  the lieutenant governor shall appoint five
  senators to the Senate Select Committee on Cybersecurity, one of
  whom shall be designated as chair; and
               (2)  the speaker of the house of representatives shall
  appoint five state representatives to the House Select Committee on
  Cybersecurity, one of whom shall be designated as chair.
         (c)  The committees established under this section shall
  convene separately at the call of the chair of the respective
  committees, or jointly at the call of both chairs. In joint
  meetings, the chairs of each committee shall act as joint chairs.
         (d)  Following consideration of the issues listed in
  Subsection (a) of this section, the committees established under
  this section shall jointly adopt recommendations on state
  cybersecurity and report in writing to the legislature any findings
  and adopted recommendations not later than January 12, 2021.
         (e)  This section expires September 1, 2021.
         SECTION 27.  As soon as practicable after the effective date
  of this Act, the governor shall appoint a chief innovation officer
  as required by Section 401.106, Government Code, as added by this
  Act.
 
         SECTION 28.  (a) An official publisher in the executive
  branch of state government shall comply with the applicable
  provisions of Subchapter E, Chapter 2051, Government Code, as added
  by this Act, in accordance with an implementation plan developed
  under Subsection (b) of this section.
         (b)  The Texas State Library and Archives Commission and an
  official publisher in the executive branch of state government are
  jointly responsible for developing an implementation plan for the
  applicable provisions of Subchapter E, Chapter 2051, Government
  Code, as added by this Act. The implementation plan must:
               (1)  for each applicable type of legal material defined
  by Subchapter E, Chapter 2051, Government Code, as added by this
  Act, advise as to the method by which the legal material may be
  authenticated, preserved, and made available on a permanent basis;
  and
               (2)  establish a timeline for the official publisher to
  comply with Sections 2051.154, 2051.155, 2051.157, and 2051.158,
  Government Code, as added by this Act.
         (c)  The implementation plan developed under Subsection (b)
  of this section may provide for compliance by an official publisher
  in the executive branch of state government with Sections 2051.154,
  2051.155, 2051.157, and 2051.158, Government Code, as added by this
  Act, to be phased in over a period of time.
         (d)  The Texas State Library and Archives Commission shall
  provide the implementation plan developed under Subsection (b) of
  this section to the legislature not later than September 1, 2020.
         SECTION 29.  (a) An official publisher in the legislative
  branch of state government shall comply with the applicable
  provisions of Subchapter E, Chapter 2051, Government Code, as added
  by this Act, in accordance with an implementation plan developed
  under Subsection (b) of this section.
         (b)  An official publisher in the legislative branch of state
  government, in consultation with the lieutenant governor, the
  speaker of the house of representatives, the Senate Committee on
  Administration, and the House Committee on Administration, shall
  develop an implementation plan for the applicable provisions of
  Subchapter E, Chapter 2051, Government Code, as added by this Act.
  The implementation plan must:
               (1)  for each applicable type of legal material defined
  by Subchapter E, Chapter 2051, Government Code, as added by this
  Act, recommend the method by which the legal material may be
  authenticated, preserved, and made available on a permanent basis;
  and
               (2)  establish a timeline for the official publisher to
  comply with Sections 2051.154, 2051.155, 2051.157, and 2051.158,
  Government Code, as added by this Act.
         (c)  The implementation plan developed under Subsection (b)
  of this section may provide for compliance by an official publisher
  in the legislative branch of state government with Sections
  2051.154, 2051.155, 2051.157, and 2051.158, Government Code, as
  added by this Act, to be phased in over a period of time.
         (d)  An official publisher in the legislative branch of state
  government shall provide the implementation plan developed under
  Subsection (b) of this section to the lieutenant governor and
  speaker of the house of representatives not later than September 1,
  2020.
         SECTION 30.  Section 2054.139, Government Code, as added by
  this Act, requiring a new employee of a state agency to complete
  cybersecurity training, applies only to an employee who begins
  employment on or after the effective date of this Act.
         SECTION 31.  Section 2155.092, Government Code, as added by
  this Act, applies only in relation to a contract for which a state
  agency first advertises or otherwise solicits bids, offers,
  proposals, or other expressions of interest on or after the
  effective date of this Act.
         SECTION 32.  Section 2157.007, Government Code, as amended
  by this Act, applies only with respect to a purchase made by a state
  agency on or after the effective date of this Act. A purchase made
  before the effective date of this Act is governed by the law in
  effect on the date the purchase was made, and the former law is
  continued in effect for that purpose.
         SECTION 33.  If before implementing any provision of this
  Act a state agency determines that a waiver or authorization from a
  federal agency is necessary for implementation of that provision,
  the agency affected by the provision shall request the waiver or
  authorization and may delay implementing that provision until the
  waiver or authorization is granted.
         SECTION 34.  This Act takes effect September 1, 2019.