|  | 
         
            |  | 
         
            |  | A BILL TO BE ENTITLED | 
         
            |  | AN ACT | 
         
            |  | relating to state agency and local government information security, | 
         
            |  | including establishment of the state risk and authorization | 
         
            |  | management program and the Texas volunteer incident response team; | 
         
            |  | authorizing fees. | 
         
            |  | BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF TEXAS: | 
         
            |  | SECTION 1.  Subchapter C, Chapter 2054, Government Code, is | 
         
            |  | amended by adding Sections 2054.0593 and 2054.05935 to read as | 
         
            |  | follows: | 
         
            |  | Sec. 2054.0593.  CLOUD COMPUTING STATE RISK AND | 
         
            |  | AUTHORIZATION MANAGEMENT PROGRAM.  (a)  In this section, "cloud | 
         
            |  | computing services" has the meaning assigned by Section 2157.007. | 
         
            |  | (b)  The department shall establish a state risk and | 
         
            |  | authorization management program to provide a standardized | 
         
            |  | approach for security assessment, authorization, and continuous | 
         
            |  | monitoring of cloud computing services that process the data of a | 
         
            |  | state agency. | 
         
            |  | (c)  The department shall prescribe: | 
         
            |  | (1)  the categories and characteristics of cloud | 
         
            |  | computing services subject to the state risk and authorization | 
         
            |  | management program; and | 
         
            |  | (2)  the requirements for certification through the | 
         
            |  | program of vendors that provide cloud computing services. | 
         
            |  | (d)  A state agency shall require each vendor contracting | 
         
            |  | with the agency to provide cloud computing services for the agency | 
         
            |  | to comply with the requirements of the state risk and authorization | 
         
            |  | management program.  The department shall evaluate vendors to | 
         
            |  | determine whether a vendor qualifies for a certification issued by | 
         
            |  | the department reflecting compliance with program requirements. | 
         
            |  | (e)  A state agency may not enter or renew a contract with a | 
         
            |  | vendor to purchase cloud computing services subject to the state | 
         
            |  | risk and authorization management program unless the vendor | 
         
            |  | demonstrates compliance with program requirements. The vendor may | 
         
            |  | demonstrate compliance by submitting documentation that shows the | 
         
            |  | vendor's compliance with the risk and authorization management | 
         
            |  | program of another state that the department approves. | 
         
            |  | (f)  A state agency shall require a vendor contracting with | 
         
            |  | the agency to provide cloud computing services subject to the state | 
         
            |  | risk and authorization management program to maintain program | 
         
            |  | compliance and certification throughout the term of the contract. | 
         
            |  | Sec. 2054.05935.  SECURITY CONTROLS FOR STATE AGENCY DATA. | 
         
            |  | Each state agency entering into or renewing a contract with a vendor | 
         
            |  | authorized to access, transmit, use, or store data for the agency | 
         
            |  | shall include a provision in the contract requiring the vendor to | 
         
            |  | meet the security controls the agency determines are proportionate | 
         
            |  | with the agency's risk under the contract based on the sensitivity | 
         
            |  | of the agency's data. The vendor must periodically provide to the | 
         
            |  | agency evidence that the vendor meets the security controls | 
         
            |  | required under the contract. | 
         
            |  | SECTION 2.  Section 2054.0594, Government Code, is amended | 
         
            |  | by adding Subsection (d) to read as follows: | 
         
            |  | (d)  The department shall establish a framework for regional | 
         
            |  | cybersecurity working groups to execute mutual aid agreements that | 
         
            |  | allow state agencies, local governments, regional planning | 
         
            |  | commissions, public and private institutions of higher education, | 
         
            |  | the private sector, and the incident response team established | 
         
            |  | under Subchapter N-2 to assist with responding to a cybersecurity | 
         
            |  | event in this state. A working group may be established within the | 
         
            |  | geographic area of a regional planning commission established under | 
         
            |  | Chapter 391, Local Government Code. The working group may establish | 
         
            |  | a list of available cybersecurity experts and share resources to | 
         
            |  | assist in responding to the cybersecurity event and recovery from | 
         
            |  | the event. | 
         
            |  | SECTION 3.  Subchapter F, Chapter 2054, Government Code, is | 
         
            |  | amended by adding Section 2054.137 to read as follows: | 
         
            |  | Sec. 2054.137.  DESIGNATED DATA MANAGEMENT OFFICER.  (a) | 
         
            |  | Each state agency with more than 150 full-time employees shall | 
         
            |  | designate a full-time employee of the agency to serve as a data | 
         
            |  | management officer. | 
         
            |  | (b)  The data management officer for a state agency shall: | 
         
            |  | (1)  coordinate with the chief data officer to ensure | 
         
            |  | the agency performs the duties assigned under Section 2054.0286; | 
         
            |  | (2)  in accordance with department guidelines, | 
         
            |  | establish an agency data governance program to identify the | 
         
            |  | agency's data assets, exercise authority and management over the | 
         
            |  | agency's data assets, and establish related processes and | 
         
            |  | procedures to oversee the agency's data assets; and | 
         
            |  | (3)  coordinate with the agency's information security | 
         
            |  | officer, the agency's records management officer, and the Texas | 
         
            |  | State Library and Archives Commission to: | 
         
            |  | (A)  implement best practices for managing and | 
         
            |  | securing data in accordance with state privacy laws and data | 
         
            |  | privacy classifications; | 
         
            |  | (B)  ensure records management programs are | 
         
            |  | implemented by the agency for all types of data storage media; and | 
         
            |  | (C)  increase awareness of and outreach for state | 
         
            |  | agency records management programs. | 
         
            |  | (c)  In accordance with department guidelines, the data | 
         
            |  | management officer for the state agency shall post on the Texas Open | 
         
            |  | Data Portal established by the department under Section 2054.070 at | 
         
            |  | least three high-value data sets as defined by Section 2054.1265. | 
         
            |  | The high-value data sets may not include information that is | 
         
            |  | confidential or protected from disclosure under state or federal | 
         
            |  | law. | 
         
            |  | SECTION 4.  Subchapter G, Chapter 2054, Government Code, is | 
         
            |  | amended by adding Section 2054.161 to read as follows: | 
         
            |  | Sec. 2054.161.  DATA CLASSIFICATION, SECURITY, AND | 
         
            |  | RETENTION REQUIREMENTS.  On initiation of an information resources | 
         
            |  | technology project, including an application development project | 
         
            |  | and any information resources projects described in this | 
         
            |  | subchapter, a state agency shall classify the data produced from or | 
         
            |  | used in the project and determine appropriate data security and | 
         
            |  | retention requirements for each classification. | 
         
            |  | SECTION 5.  Chapter 2054, Government Code, is amended by | 
         
            |  | adding Subchapter N-2 to read as follows: | 
         
            |  | SUBCHAPTER N-2. TEXAS VOLUNTEER INCIDENT RESPONSE TEAM | 
         
            |  | Sec. 2054.52001.  DEFINITIONS.  In this subchapter: | 
         
            |  | (1)  "Incident response team" means the Texas volunteer | 
         
            |  | incident response team established under Section 2054.52002. | 
         
            |  | (2)  "Participating entity" means a state agency, | 
         
            |  | including an institution of higher education, or a local government | 
         
            |  | that receives assistance under this subchapter during a | 
         
            |  | cybersecurity event. | 
         
            |  | (3)  "Volunteer" means an individual who provides rapid | 
         
            |  | response assistance during a cybersecurity event under this | 
         
            |  | subchapter. | 
         
            |  | Sec. 2054.52002.  ESTABLISHMENT OF TEXAS VOLUNTEER INCIDENT | 
         
            |  | RESPONSE TEAM.  (a)  The department shall establish the Texas | 
         
            |  | volunteer incident response team to provide rapid response | 
         
            |  | assistance to a participating entity under the department's | 
         
            |  | direction during a cybersecurity event. | 
         
            |  | (b)  The department shall prescribe eligibility criteria for | 
         
            |  | participation as a volunteer member of the incident response team, | 
         
            |  | including a requirement that each volunteer have expertise in | 
         
            |  | addressing cybersecurity events. | 
         
            |  | Sec. 2054.52003.  CONTRACT WITH VOLUNTEERS.  The department | 
         
            |  | shall enter into a contract with each volunteer the department | 
         
            |  | approves to provide rapid response assistance under this | 
         
            |  | subchapter. The contract must require the volunteer to: | 
         
            |  | (1)  acknowledge the confidentiality of information | 
         
            |  | required by Section 2054.52010; | 
         
            |  | (2)  protect all confidential information from | 
         
            |  | disclosure; | 
         
            |  | (3)  avoid conflicts of interest that might arise in a | 
         
            |  | deployment under this subchapter; | 
         
            |  | (4)  comply with department security policies and | 
         
            |  | procedures regarding information resources technologies; | 
         
            |  | (5)  consent to background screening required by the | 
         
            |  | department; and | 
         
            |  | (6)  attest to the volunteer's satisfaction of any | 
         
            |  | eligibility criteria established by the department. | 
         
            |  | Sec. 2054.52004.  VOLUNTEER QUALIFICATION.  (a)  The | 
         
            |  | department shall require criminal history record information for | 
         
            |  | each individual who accepts an invitation to become a volunteer. | 
         
            |  | (b)  The department may request other information relevant | 
         
            |  | to the individual's qualification and fitness to serve as a | 
         
            |  | volunteer. | 
         
            |  | (c)  The department has sole discretion to determine whether | 
         
            |  | an individual is qualified to serve as a volunteer. | 
         
            |  | Sec. 2054.52005.  DEPLOYMENT.  (a)  In response to a | 
         
            |  | cybersecurity event that affects multiple participating entities | 
         
            |  | or a declaration by the governor of a state of disaster caused by a | 
         
            |  | cybersecurity event, the department on request of a participating | 
         
            |  | entity may deploy volunteers and provide rapid response assistance | 
         
            |  | under the department's direction to assist with the event. | 
         
            |  | (b)  A volunteer may only accept a deployment under this | 
         
            |  | subchapter in writing. A volunteer may decline to accept a | 
         
            |  | deployment for any reason. | 
         
            |  | Sec. 2054.52006.  CYBERSECURITY COUNCIL DUTIES.  The | 
         
            |  | cybersecurity council established under Section 2054.512 shall | 
         
            |  | review and make recommendations to the department regarding the | 
         
            |  | policies and procedures used by the department to implement this | 
         
            |  | subchapter. The department may consult with the council to | 
         
            |  | implement and administer this subchapter. | 
         
            |  | Sec. 2054.52007.  DEPARTMENT POWERS AND DUTIES.  (a)  The | 
         
            |  | department shall: | 
         
            |  | (1)  approve the incident response tools the incident | 
         
            |  | response team may use in responding to a cybersecurity event; | 
         
            |  | (2)  establish the eligibility criteria an individual | 
         
            |  | must meet to become a volunteer; | 
         
            |  | (3)  develop and publish guidelines for operation of | 
         
            |  | the incident response team, including the: | 
         
            |  | (A)  standards and procedures the department uses | 
         
            |  | to determine whether an individual is eligible to serve as a | 
         
            |  | volunteer; | 
         
            |  | (B)  process for an individual to apply for and | 
         
            |  | accept incident response team membership; | 
         
            |  | (C)  requirements for a participating entity to | 
         
            |  | receive assistance from the incident response team; and | 
         
            |  | (D)  process for a participating entity to request | 
         
            |  | and obtain the assistance of the incident response team; and | 
         
            |  | (4)  adopt rules necessary to implement this | 
         
            |  | subchapter. | 
         
            |  | (b)  The department may require a participating entity to | 
         
            |  | enter into a contract as a condition for obtaining assistance from | 
         
            |  | the incident response team. The contract must comply with the | 
         
            |  | requirements of Chapters 771 and 791. | 
         
            |  | (c)  The department may provide appropriate training to | 
         
            |  | prospective and approved volunteers. | 
         
            |  | (d)  In accordance with state law, the department may provide | 
         
            |  | compensation for actual and necessary travel and living expenses | 
         
            |  | incurred by a volunteer on a deployment using money available for | 
         
            |  | that purpose. | 
         
            |  | (e)  The department may establish a fee schedule for | 
         
            |  | participating entities receiving incident response team | 
         
            |  | assistance. The amount of fees collected may not exceed the | 
         
            |  | department's costs to operate the incident response team. | 
         
            |  | Sec. 2054.52008.  STATUS OF VOLUNTEER; LIABILITY.  (a)  A | 
         
            |  | volunteer is not an agent, employee, or independent contractor of | 
         
            |  | this state for any purpose and has no authority to obligate this | 
         
            |  | state to a third party. | 
         
            |  | (b)  This state is not liable to a volunteer for personal | 
         
            |  | injury or property damage sustained by the volunteer that arises | 
         
            |  | from participation in the incident response team. | 
         
            |  | Sec. 2054.52009.  CIVIL LIABILITY.  A volunteer who in good | 
         
            |  | faith provides professional services in response to a cybersecurity | 
         
            |  | event is not liable for civil damages as a result of the volunteer's | 
         
            |  | acts or omissions in providing the services, except for wilful and | 
         
            |  | wanton misconduct. This immunity is limited to services provided | 
         
            |  | during the time of deployment for a cybersecurity event. | 
         
            |  | Sec. 2054.52010.  CONFIDENTIAL INFORMATION.  Information | 
         
            |  | written, produced, collected, assembled, or maintained by the | 
         
            |  | department, a participating entity, the cybersecurity council, or a | 
         
            |  | volunteer in the implementation of this subchapter is confidential | 
         
            |  | and not subject to disclosure under Chapter 552 if the information: | 
         
            |  | (1)  contains the contact information for a volunteer; | 
         
            |  | (2)  identifies or provides a means of identifying a | 
         
            |  | person who may, as a result of disclosure of the information, become | 
         
            |  | a victim of a cybersecurity event; | 
         
            |  | (3)  consists of a participating entity's cybersecurity | 
         
            |  | plans or cybersecurity-related practices; or | 
         
            |  | (4)  is obtained from a participating entity or from a | 
         
            |  | participating entity's computer system in the course of providing | 
         
            |  | assistance under this subchapter. | 
         
            |  | SECTION 6.  Section 2054.515, Government Code, is amended to | 
         
            |  | read as follows: | 
         
            |  | Sec. 2054.515.  AGENCY INFORMATION SECURITY ASSESSMENT AND | 
         
            |  | REPORT.  (a)  At least once every two years, each state agency shall | 
         
            |  | conduct an information security assessment of the agency's: | 
         
            |  | (1)  information resources systems, network systems, | 
         
            |  | digital data storage systems, digital data security measures, and | 
         
            |  | information resources vulnerabilities; and | 
         
            |  | (2)  data governance program in accordance with | 
         
            |  | requirements established by department rule. | 
         
            |  | (b)  Not later than November 15 of each even-numbered year | 
         
            |  | [ December 1 of the year in which a state agency conducts the  | 
         
            |  | assessment under Subsection (a)], the agency shall report the | 
         
            |  | results of the assessment to: | 
         
            |  | (1)  the department; and | 
         
            |  | (2)  on request, the governor, the lieutenant governor, | 
         
            |  | and the speaker of the house of representatives. | 
         
            |  | (c)  The department by rule shall [ may] establish the | 
         
            |  | requirements for the information security assessment and report | 
         
            |  | required by this section. | 
         
            |  | (d)  The report and all documentation related to the | 
         
            |  | information security assessment and report are confidential and not | 
         
            |  | subject to disclosure under Chapter 552.  The state agency or | 
         
            |  | department may redact or withhold the information as confidential | 
         
            |  | under Chapter 552 without requesting a decision from the attorney | 
         
            |  | general under Subchapter G, Chapter 552. | 
         
            |  | SECTION 7.  Chapter 2059, Government Code, is amended by | 
         
            |  | adding Subchapter E to read as follows: | 
         
            |  | SUBCHAPTER E.  REGIONAL NETWORK SECURITY CENTERS | 
         
            |  | Sec. 2059.201.  ELIGIBLE PARTICIPATING ENTITIES.  A state | 
         
            |  | agency or an entity listed in Sections 2059.058(b)(3)-(5) is | 
         
            |  | eligible to participate in cybersecurity support and network | 
         
            |  | security provided by a regional network security center under this | 
         
            |  | subchapter. | 
         
            |  | Sec. 2059.202.  ESTABLISHMENT OF REGIONAL NETWORK SECURITY | 
         
            |  | CENTERS.  (a)  Subject to Subsection (b), the department may | 
         
            |  | establish regional network security centers to assist in providing | 
         
            |  | cybersecurity support and network security to regional offices or | 
         
            |  | locations for state agencies and other eligible entities that elect | 
         
            |  | to participate in and receive services through the center. | 
         
            |  | (b)  The department may establish more than one regional | 
         
            |  | network security center only if the department determines the first | 
         
            |  | center established by the department successfully provides to state | 
         
            |  | agencies and other eligible entities the services the center has | 
         
            |  | contracted to provide. | 
         
            |  | (c)  The department shall enter into an interagency contract | 
         
            |  | in accordance with Chapter 771 or an interlocal contract in | 
         
            |  | accordance with Chapter 791, as appropriate, with an eligible | 
         
            |  | participating entity that elects to participate in and receive | 
         
            |  | services through a regional network security center. | 
         
            |  | Sec. 2059.203.  REGIONAL NETWORK SECURITY CENTER LOCATIONS | 
         
            |  | AND PHYSICAL SECURITY.  (a)  In creating and operating a regional | 
         
            |  | network security center, the department shall partner with a | 
         
            |  | university system or institution of higher education as defined by | 
         
            |  | Section 61.003, Education Code, other than a public junior college. | 
         
            |  | The system or institution shall: | 
         
            |  | (1)  serve as an education partner with the department | 
         
            |  | for the regional network security center; and | 
         
            |  | (2)  enter into an interagency contract with the | 
         
            |  | department in accordance with Chapter 771. | 
         
            |  | (b)  In selecting the location for a regional network | 
         
            |  | security center, the department shall select a university system or | 
         
            |  | institution of higher education that has supportive educational | 
         
            |  | capabilities. | 
         
            |  | (c)  A university system or institution of higher education | 
         
            |  | selected to serve as a regional network security center shall | 
         
            |  | control and monitor all entrances to and critical areas of the | 
         
            |  | center to prevent unauthorized entry. The system or institution | 
         
            |  | shall restrict access to the center to only authorized individuals. | 
         
            |  | (d)  A local law enforcement entity or any entity providing | 
         
            |  | security for a regional network security center shall monitor | 
         
            |  | security alarms at the regional network security center subject to | 
         
            |  | the availability of that service. | 
         
            |  | (e)  The department and a university system or institution of | 
         
            |  | higher education selected to serve as a regional network security | 
         
            |  | center shall restrict operational information to only center | 
         
            |  | personnel, except as provided by Chapter 321. | 
         
            |  | Sec. 2059.204.  REGIONAL NETWORK SECURITY CENTERS SERVICES | 
         
            |  | AND SUPPORT.  The department may offer the following managed | 
         
            |  | security services through a regional network security center: | 
         
            |  | (1)  real-time network security monitoring to detect | 
         
            |  | and respond to network security events that may jeopardize this | 
         
            |  | state and the residents of this state; | 
         
            |  | (2)  alerts and guidance for defeating network security | 
         
            |  | threats, including firewall configuration, installation, | 
         
            |  | management, and monitoring, intelligence gathering, and protocol | 
         
            |  | analysis; | 
         
            |  | (3)  immediate response to counter network security | 
         
            |  | activity that exposes this state and the residents of this state to | 
         
            |  | risk, including complete intrusion detection system installation, | 
         
            |  | management, and monitoring for participating entities; | 
         
            |  | (4)  development, coordination, and execution of | 
         
            |  | statewide cybersecurity operations to isolate, contain, and | 
         
            |  | mitigate the impact of network security incidents for participating | 
         
            |  | entities; and | 
         
            |  | (5)  cybersecurity educational services. | 
         
            |  | Sec. 2059.205.  NETWORK SECURITY GUIDELINES AND STANDARD | 
         
            |  | OPERATING PROCEDURES.  (a)  The department shall adopt and provide | 
         
            |  | to each regional network security center appropriate network | 
         
            |  | security guidelines and standard operating procedures to ensure | 
         
            |  | efficient operation of the center with a maximum return on the | 
         
            |  | state's investment. | 
         
            |  | (b)  The department shall revise the standard operating | 
         
            |  | procedures as necessary to confirm network security. | 
         
            |  | (c)  Each eligible participating entity that elects to | 
         
            |  | participate in a regional network security center shall comply with | 
         
            |  | the network security guidelines and standard operating procedures. | 
         
            |  | SECTION 8.  Subtitle B, Title 10, Government Code, is | 
         
            |  | amended by adding Chapter 2062 to read as follows: | 
         
            |  | CHAPTER 2062. RESTRICTIONS ON STATE AGENCY USE OF CERTAIN | 
         
            |  | INDIVIDUAL-IDENTIFYING INFORMATION | 
         
            |  | Sec. 2062.001.  DEFINITIONS.  In this chapter: | 
         
            |  | (1)  "Biometric identifier" has the meaning assigned by | 
         
            |  | Section 560.001. | 
         
            |  | (2)  "State agency" means a department, commission, | 
         
            |  | board, office, council, authority, or other agency in the | 
         
            |  | executive, legislative, or judicial branch of state government, | 
         
            |  | including a university system or institution of higher education as | 
         
            |  | defined by Section 61.003, Education Code, that is created by the | 
         
            |  | constitution or a statute of this state. | 
         
            |  | Sec. 2062.002.  CONSENT REQUIRED BEFORE ACQUIRING, | 
         
            |  | RETAINING, OR DISSEMINATING CERTAIN INFORMATION; RECORDS. (a) | 
         
            |  | Except as provided by Subsection (b), a state agency may not: | 
         
            |  | (1)  use global positioning system technology, | 
         
            |  | individual contact tracing, or technology designed to obtain | 
         
            |  | biometric identifiers to acquire information that alone or in | 
         
            |  | conjunction with other information identifies an individual or the | 
         
            |  | individual's location without the individual's written consent; | 
         
            |  | (2)  retain information with respect to an individual | 
         
            |  | described by Subdivision (1) without the individual's written | 
         
            |  | consent; or | 
         
            |  | (3)  disseminate to a person the information described | 
         
            |  | by Subdivision (1) with respect to an individual unless the state | 
         
            |  | agency first obtains the individual's written consent. | 
         
            |  | (b)  A state agency may acquire, retain, and disseminate | 
         
            |  | information described by Subsection (a) with respect to an | 
         
            |  | individual without the individual's written consent if the | 
         
            |  | acquisition, retention, or dissemination is: | 
         
            |  | (1)  required or permitted by a federal statute or by a | 
         
            |  | state statute other than Chapter 552; or | 
         
            |  | (2)  made by or to a law enforcement agency for a law | 
         
            |  | enforcement purpose. | 
         
            |  | (c)  A state agency shall retain the written consent of an | 
         
            |  | individual obtained as required under this section in the agency's | 
         
            |  | records until the contract or agreement under which the information | 
         
            |  | is acquired, retained, or disseminated expires. | 
         
            |  | SECTION 9.  (a) Not later than December 1, 2021, the | 
         
            |  | Department of Information Resources shall: | 
         
            |  | (1)  establish the state risk and authorization | 
         
            |  | management program as required by Section 2054.0593, Government | 
         
            |  | Code, as added by this Act; | 
         
            |  | (2)  establish the framework for regional | 
         
            |  | cybersecurity working groups to execute mutual aid agreements as | 
         
            |  | required under Section 2054.0594(d), Government Code, as added by | 
         
            |  | this Act; and | 
         
            |  | (3)  establish the Texas volunteer incident response | 
         
            |  | team as required by Subchapter N-2, Chapter 2054, Government Code, | 
         
            |  | as added by this Act. | 
         
            |  | (b)  Each state agency shall ensure that: | 
         
            |  | (1)  each contract for cloud computing services the | 
         
            |  | agency enters into or renews on or after January 1, 2022, complies | 
         
            |  | with Section 2054.0593, Government Code, as added by this Act; and | 
         
            |  | (2)  each contract subject to Section 2054.05935, | 
         
            |  | Government Code, as added by this Act, that is executed on or after | 
         
            |  | the effective date of this Act complies with that section. | 
         
            |  | (c)  Each state agency subject to Section 2054.137, | 
         
            |  | Government Code, as added by this Act, shall designate a data | 
         
            |  | management officer as soon as practicable after the effective date | 
         
            |  | of this Act. | 
         
            |  | (d)  Each state agency subject to Section 2054.161, | 
         
            |  | Government Code, as added by this Act, shall ensure each | 
         
            |  | information resources technology project initiated on or after the | 
         
            |  | effective date of this Act complies with that section. | 
         
            |  | SECTION 10.  Not later than October 15, 2022, the Department | 
         
            |  | of Information Resources shall submit to the standing committees of | 
         
            |  | the senate and house of representatives with primary jurisdiction | 
         
            |  | over state agency cybersecurity a report on the department's | 
         
            |  | activities and recommendations related to the Texas volunteer | 
         
            |  | incident response team established as required by Subchapter N-2, | 
         
            |  | Chapter 2054, Government Code, as added by this Act. | 
         
            |  | SECTION 11.  Chapter 2062, Government Code, as added by this | 
         
            |  | Act, applies only to information acquired, retained, or | 
         
            |  | disseminated by a state agency to another person on or after the | 
         
            |  | effective date of this Act. | 
         
            |  | SECTION 12.  (a)  Except as provided by Subsection (b) of | 
         
            |  | this section, this Act takes effect immediately if it receives a | 
         
            |  | vote of two-thirds of all the members elected to each house, as | 
         
            |  | provided by Section 39, Article III, Texas Constitution.  If this | 
         
            |  | Act does not receive the vote necessary for immediate effect, this | 
         
            |  | Act takes effect September 1, 2021. | 
         
            |  | (b)  Chapter 2062, Government Code, as added by this Act, | 
         
            |  | takes effect September 1, 2021. |