By: Nelson  S.B. No. 475
         (In the Senate - Filed January 27, 2021; March 9, 2021, read
  first time and referred to Committee on Finance; April 12, 2021,
  reported adversely, with favorable Committee Substitute by the
  following vote:  Yeas 15, Nays 0; April 12, 2021, sent to printer.)
Click here to see the committee vote
 
  COMMITTEE SUBSTITUTE FOR S.B. No. 475 By:  Nelson
 
 
A BILL TO BE ENTITLED
 
AN ACT
 
  relating to state agency and local government information
  management and security, including establishment of the state risk
  and authorization management program and the Texas volunteer
  incident response team; authorizing fees.
         BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF TEXAS:
         SECTION 1.  Subchapter B, Chapter 2054, Government Code, is
  amended by adding Section 2054.0332 to read as follows:
         Sec. 2054.0332.  DATA MANAGEMENT ADVISORY COMMITTEE. (a)  
  The board shall appoint a data management advisory committee.
         (b)  The advisory committee is composed of each data
  management officer designated by a state agency under Section
  2054.137 and the department's chief data officer.
         (c)  The advisory committee shall:
               (1)  advise the board and department on establishing
  statewide data ethics, principles, goals, strategies, standards,
  and architecture;
               (2)  provide guidance and recommendations on governing
  and managing state agency data and data management systems,
  including recommendations to assist data management officers in
  fulfilling the duties assigned under Section 2054.137; and
               (3)  establish performance objectives for state
  agencies from this state's data-driven policy goals.
         (d)  Sections 2110.002 and 2110.008 do not apply to the
  advisory committee.
         SECTION 2.  Subchapter C, Chapter 2054, Government Code, is
  amended by adding Section 2054.0593 to read as follows:
         Sec. 2054.0593.  CLOUD COMPUTING STATE RISK AND
  AUTHORIZATION MANAGEMENT PROGRAM. (a)  In this section, "cloud
  computing service" has the meaning assigned by Section 2157.007.
         (b)  The department shall establish a state risk and
  authorization management program to provide a standardized
  approach for security assessment, authorization, and continuous
  monitoring of cloud computing services that process the data of a
  state agency.  The program must allow a vendor to demonstrate
  compliance by submitting documentation that shows the vendor's
  compliance with a risk and authorization management program of:
               (1)  the federal government; or
               (2)  another state that the department approves.
         (c)  The department by rule shall prescribe:
               (1)  the categories and characteristics of cloud
  computing services subject to the state risk and authorization
  management program; and
               (2)  the requirements for certification through the
  program of vendors that provide cloud computing services.
         (d)  A state agency shall require each vendor contracting
  with the agency to provide cloud computing services for the agency
  to comply with the requirements of the state risk and authorization
  management program. The department shall evaluate vendors to
  determine whether a vendor qualifies for a certification issued by
  the department reflecting compliance with program requirements.
         (e)  A state agency may not enter or renew a contract with a
  vendor to purchase cloud computing services for the agency that are
  subject to the state risk and authorization management program
  unless the vendor demonstrates compliance with program
  requirements.
         (f)  A state agency shall require a vendor contracting with
  the agency to provide cloud computing services for the agency that
  are subject to the state risk and authorization management program
  to maintain program compliance and certification throughout the
  term of the contract.
         SECTION 3.  Section 2054.0594, Government Code, is amended
  by adding Subsection (d) to read as follows:
         (d)  The department shall establish a framework for regional
  cybersecurity working groups to execute mutual aid agreements that
  allow state agencies, local governments, regional planning
  commissions, public and private institutions of higher education,
  the private sector, and the incident response team established
  under Subchapter N-2 to assist with responding to a cybersecurity
  event in this state. A working group may be established within the
  geographic area of a regional planning commission established under
  Chapter 391, Local Government Code. The working group may
  establish a list of available cybersecurity experts and share
  resources to assist in responding to the cybersecurity event and
  recovery from the event.
         SECTION 4.  Subchapter F, Chapter 2054, Government Code, is
  amended by adding Sections 2054.137 and 2054.138 to read as
  follows:
         Sec. 2054.137.  DESIGNATED DATA MANAGEMENT OFFICER. (a)  
  Each state agency with more than 150 full-time employees shall
  designate a full-time employee of the agency to serve as a data
  management officer.
         (b)  The data management officer for a state agency shall:
               (1)  coordinate with the chief data officer to ensure
  the agency performs the duties assigned under Section 2054.0286;
               (2)  in accordance with department guidelines,
  establish an agency data governance program to identify the
  agency's data assets, exercise authority and management over the
  agency's data assets, and establish related processes and
  procedures to oversee the agency's data assets; and
               (3)  coordinate with the agency's information security
  officer, the agency's records management officer, and the Texas
  State Library and Archives Commission to:
                     (A)  implement best practices for managing and
  securing data in accordance with state privacy laws and data
  privacy classifications;
                     (B)  ensure the agency's records management
  programs apply to all types of data storage media;
                     (C)  increase awareness of and outreach for the
  agency's records management programs within the agency; and
                     (D)  conduct a data maturity assessment of the
  agency's data governance program in accordance with the
  requirements established by department rule.
         (c)  In accordance with department guidelines, the data
  management officer for the state agency shall post on the Texas Open
  Data Portal established by the department under Section 2054.070 at
  least three high-value data sets as defined by Section 2054.1265.
  The high-value data sets may not include information that is
  confidential or protected from disclosure under state or federal
  law.
         Sec. 2054.138.  SECURITY CONTROLS FOR STATE AGENCY DATA.
  Each state agency entering into or renewing a contract with a vendor
  authorized to access, transmit, use, or store data for the agency
  shall include a provision in the contract requiring the vendor to
  meet the security controls the agency determines are proportionate
  with the agency's risk under the contract based on the sensitivity
  of the agency's data. The vendor must periodically provide to the
  agency evidence that the vendor meets the security controls
  required under the contract.
         SECTION 5.  Subchapter G, Chapter 2054, Government Code, is
  amended by adding Section 2054.161 to read as follows:
         Sec. 2054.161.  DATA CLASSIFICATION, SECURITY, AND
  RETENTION REQUIREMENTS. On initiation of an information resources
  technology project, including an application development project
  and any information resources projects described in this
  subchapter, a state agency shall classify the data produced from or
  used in the project and determine appropriate data security and
  applicable retention requirements under Section 441.185 for each
  classification.
         SECTION 6.  Chapter 2054, Government Code, is amended by
  adding Subchapter N-2 to read as follows:
         SUBCHAPTER N-2. TEXAS VOLUNTEER INCIDENT RESPONSE TEAM
         Sec. 2054.52001.  DEFINITIONS. In this subchapter:
               (1)  "Incident response team" means the Texas volunteer
  incident response team established under Section 2054.52002.
               (2)  "Participating entity" means a state agency,
  including an institution of higher education, or a local government
  that receives assistance under this subchapter during a
  cybersecurity event.
               (3)  "Volunteer" means an individual who provides rapid
  response assistance during a cybersecurity event under this
  subchapter.
         Sec. 2054.52002.  ESTABLISHMENT OF TEXAS VOLUNTEER INCIDENT
  RESPONSE TEAM. (a)  The department shall establish the Texas
  volunteer incident response team to provide rapid response
  assistance to a participating entity under the department's
  direction during a cybersecurity event.
         (b)  The department shall prescribe eligibility criteria for
  participation as a volunteer member of the incident response team,
  including a requirement that each volunteer have expertise in
  addressing cybersecurity events.
         Sec. 2054.52003.  CONTRACT WITH VOLUNTEERS. The department
  shall enter into a contract with each volunteer the department
  approves to provide rapid response assistance under this
  subchapter. The contract must require the volunteer to:
               (1)  acknowledge the confidentiality of information
  required by Section 2054.52010;
               (2)  protect all confidential information from
  disclosure;
               (3)  avoid conflicts of interest that might arise in a
  deployment under this subchapter;
               (4)  comply with department security policies and
  procedures regarding information resources technologies;
               (5)  consent to background screening required by the
  department; and
               (6)  attest to the volunteer's satisfaction of any
  eligibility criteria established by the department.
         Sec. 2054.52004.  VOLUNTEER QUALIFICATION. (a)  The
  department shall require criminal history record information for
  each individual who accepts an invitation to become a volunteer.
         (b)  The department may request other information relevant
  to the individual's qualification and fitness to serve as a
  volunteer.
         (c)  The department has sole discretion to determine whether
  an individual is qualified to serve as a volunteer.
         Sec. 2054.52005.  DEPLOYMENT. (a)  In response to a
  cybersecurity event that affects multiple participating entities
  or a declaration by the governor of a state of disaster caused by a
  cybersecurity event, the department on request of a participating
  entity may deploy volunteers and provide rapid response assistance
  under the department's direction and the managed security services
  framework established under Section 2054.0594(d) to assist with the
  event.
         (b)  A volunteer may only accept a deployment under this
  subchapter in writing. A volunteer may decline to accept a
  deployment for any reason.
         Sec. 2054.52006.  CYBERSECURITY COUNCIL DUTIES. The
  cybersecurity council established under Section 2054.512 shall
  review and make recommendations to the department regarding the
  policies and procedures used by the department to implement this
  subchapter. The department may consult with the council to
  implement and administer this subchapter.
         Sec. 2054.52007.  DEPARTMENT POWERS AND DUTIES. (a)  The
  department shall:
               (1)  approve the incident response tools the incident
  response team may use in responding to a cybersecurity event;
               (2)  establish the eligibility criteria an individual
  must meet to become a volunteer;
               (3)  develop and publish guidelines for operation of
  the incident response team, including the:
                     (A)  standards and procedures the department uses
  to determine whether an individual is eligible to serve as a
  volunteer;
                     (B)  process for an individual to apply for and
  accept incident response team membership;
                     (C)  requirements for a participating entity to
  receive assistance from the incident response team; and
                     (D)  process for a participating entity to request
  and obtain the assistance of the incident response team; and
               (4)  adopt rules necessary to implement this
  subchapter.
         (b)  The department may require a participating entity to
  enter into a contract as a condition for obtaining assistance from
  the incident response team. The contract must comply with the
  requirements of Chapters 771 and 791.
         (c)  The department may provide appropriate training to
  prospective and approved volunteers.
         (d)  In accordance with state law, the department may provide
  compensation for actual and necessary travel and living expenses
  incurred by a volunteer on a deployment using money available for
  that purpose.
         (e)  The department may establish a fee schedule for
  participating entities receiving incident response team
  assistance. The amount of fees collected may not exceed the
  department's costs to operate the incident response team.
         Sec. 2054.52008.  STATUS OF VOLUNTEER; LIABILITY. (a)  A
  volunteer is not an agent, employee, or independent contractor of
  this state for any purpose and has no authority to obligate this
  state to a third party.
         (b)  This state is not liable to a volunteer for personal
  injury or property damage sustained by the volunteer that arises
  from participation in the incident response team.
         Sec. 2054.52009.  CIVIL LIABILITY. A volunteer who in good
  faith provides professional services in response to a cybersecurity
  event is not liable for civil damages as a result of the volunteer's
  acts or omissions in providing the services, except for wilful and
  wanton misconduct. This immunity is limited to services provided
  during the time of deployment for a cybersecurity event.
         Sec. 2054.52010.  CONFIDENTIAL INFORMATION. Information
  written, produced, collected, assembled, or maintained by the
  department, a participating entity, the cybersecurity council, or a
  volunteer in the implementation of this subchapter is confidential
  and not subject to disclosure under Chapter 552 if the information:
               (1)  contains the contact information for a volunteer;
               (2)  identifies or provides a means of identifying a
  person who may, as a result of disclosure of the information, become
  a victim of a cybersecurity event;
               (3)  consists of a participating entity's cybersecurity
  plans or cybersecurity-related practices; or
               (4)  is obtained from a participating entity or from a
  participating entity's computer system in the course of providing
  assistance under this subchapter.
         SECTION 7.  Section 2054.515, Government Code, is amended to
  read as follows:
         Sec. 2054.515.  AGENCY INFORMATION SECURITY ASSESSMENT AND
  REPORT. (a)  At least once every two years, each state agency shall
  conduct an information security assessment of the agency's:
               (1)  information resources systems, network systems,
  digital data storage systems, digital data security measures, and
  information resources vulnerabilities; and
               (2)  data governance program with participation from
  the agency's data management officer, if applicable, and in
  accordance with requirements established by department rule.
         (b)  Not later than November 15 of each even-numbered year
  [December 1 of the year in which a state agency conducts the
  assessment under Subsection (a)], the agency shall report the
  results of the assessment to:
               (1)  the department; and
               (2)  on request, the governor, the lieutenant governor,
  and the speaker of the house of representatives.
         (c)  The department by rule shall [may] establish the
  requirements for the information security assessment and report
  required by this section.
         (d)  The report and all documentation related to the
  information security assessment and report are confidential and not
  subject to disclosure under Chapter 552. The state agency or
  department may redact or withhold the information as confidential
  under Chapter 552 without requesting a decision from the attorney
  general under Subchapter G, Chapter 552.
         SECTION 8.  Section 2054.601, Government Code, is amended to
  read as follows:
         Sec. 2054.601.  USE OF NEXT GENERATION TECHNOLOGY. Each
  state agency and local government shall, in the administration of
  the agency or local government, consider using next generation
  technologies, including cryptocurrency, blockchain technology,
  robotic process automation, and artificial intelligence.
         SECTION 9.  Chapter 2059, Government Code, is amended by
  adding Subchapter E to read as follows:
  SUBCHAPTER E. REGIONAL NETWORK SECURITY CENTERS
         Sec. 2059.201.  ELIGIBLE PARTICIPATING ENTITIES. A state
  agency or an entity listed in Sections 2059.058(b)(3)-(5) is
  eligible to participate in cybersecurity support and network
  security provided by a regional network security center under this
  subchapter.
         Sec. 2059.202.  ESTABLISHMENT OF REGIONAL NETWORK SECURITY
  CENTERS. (a)  Subject to Subsection (b), the department may
  establish regional network security centers, under the
  department's managed security services framework established by
  Section 2054.0594(d), to assist in providing cybersecurity support
  and network security to regional offices or locations for state
  agencies and other eligible entities that elect to participate in
  and receive services through the center.
         (b)  The department may establish more than one regional
  network security center only if the department determines the first
  center established by the department successfully provides to state
  agencies and other eligible entities the services the center has
  contracted to provide.
         (c)  The department shall enter into an interagency contract
  in accordance with Chapter 771 or an interlocal contract in
  accordance with Chapter 791, as appropriate, with an eligible
  participating entity that elects to participate in and receive
  services through a regional network security center.
         Sec. 2059.203.  REGIONAL NETWORK SECURITY CENTER LOCATIONS
  AND PHYSICAL SECURITY. (a)  In creating and operating a regional
  network security center, the department shall partner with a
  university system or institution of higher education as defined by
  Section 61.003, Education Code, other than a public junior college.
  The system or institution shall:
               (1)  serve as an education partner with the department
  for the regional network security center; and
               (2)  enter into an interagency contract with the
  department in accordance with Chapter 771.
         (b)  In selecting the location for a regional network
  security center, the department shall select a university system or
  institution of higher education that has supportive educational
  capabilities.
         (c)  A university system or institution of higher education
  selected to serve as a regional network security center shall
  control and monitor all entrances to and critical areas of the
  center to prevent unauthorized entry. The system or institution
  shall restrict access to the center to only authorized individuals.
         (d)  A local law enforcement entity or any entity providing
  security for a regional network security center shall monitor
  security alarms at the regional network security center subject to
  the availability of that service.
         (e)  The department and a university system or institution of
  higher education selected to serve as a regional network security
  center shall restrict operational information to only center
  personnel, except as provided by Chapter 321.
         Sec. 2059.204.  REGIONAL NETWORK SECURITY CENTERS SERVICES
  AND SUPPORT. The department may offer the following managed
  security services through a regional network security center:
               (1)  real-time network security monitoring to detect
  and respond to network security events that may jeopardize this
  state and the residents of this state;
               (2)  alerts and guidance for defeating network security
  threats, including firewall configuration, installation,
  management, and monitoring, intelligence gathering, and protocol
  analysis;
               (3)  immediate response to counter network security
  activity that exposes this state and the residents of this state to
  risk, including complete intrusion detection system installation,
  management, and monitoring for participating entities;
               (4)  development, coordination, and execution of
  statewide cybersecurity operations to isolate, contain, and
  mitigate the impact of network security incidents for participating
  entities; and
               (5)  cybersecurity educational services.
         Sec. 2059.205.  NETWORK SECURITY GUIDELINES AND STANDARD
  OPERATING PROCEDURES. (a) The department shall adopt and provide
  to each regional network security center appropriate network
  security guidelines and standard operating procedures to ensure
  efficient operation of the center with a maximum return on the
  state's investment.
         (b)  The department shall revise the standard operating
  procedures as necessary to confirm network security.
         (c)  Each eligible participating entity that elects to
  participate in a regional network security center shall comply with
  the network security guidelines and standard operating procedures.
         SECTION 10.  Subtitle B, Title 10, Government Code, is
  amended by adding Chapter 2062 to read as follows:
  CHAPTER 2062. RESTRICTIONS ON STATE AGENCY USE OF CERTAIN
  INDIVIDUAL-IDENTIFYING INFORMATION
         Sec. 2062.001.  DEFINITIONS. In this chapter:
               (1)  "Biometric identifier" has the meaning assigned by
  Section 560.001.
               (2)  "State agency" means a department, commission,
  board, office, council, authority, or other agency in the
  executive, legislative, or judicial branch of state government,
  including a university system or institution of higher education as
  defined by Section 61.003, Education Code, that is created by the
  constitution or a statute of this state.
         Sec. 2062.002.  CONSENT REQUIRED BEFORE ACQUIRING,
  RETAINING, OR DISSEMINATING CERTAIN INFORMATION; RECORDS.  (a)  
  Except as provided by Subsection (b), a state agency may not:
               (1)  use global positioning system technology,
  individual contact tracing, or technology designed to obtain
  biometric identifiers to acquire information that alone or in
  conjunction with other information identifies an individual or the
  individual's location without the individual's written or
  electronic consent;
               (2)  retain information with respect to an individual
  described by Subdivision (1) without the individual's written or
  electronic consent; or
               (3)  disseminate to a person the information described
  by Subdivision (1) with respect to an individual unless the state
  agency first obtains the individual's written or electronic
  consent.
         (b)  A state agency may acquire, retain, and disseminate
  information described by Subsection (a) with respect to an
  individual without the individual's written or electronic consent
  if the acquisition, retention, or dissemination is:
               (1)  required or permitted by a federal statute or by a
  state statute other than Chapter 552; or
               (2)  made by or to a law enforcement agency for a law
  enforcement purpose.
         (c)  A state agency shall retain the written or electronic
  consent of an individual obtained as required under this section in
  the agency's records until the contract or agreement under which
  the information is acquired, retained, or disseminated expires.
         SECTION 11.  (a)  Not later than December 1, 2021, the
  Department of Information Resources shall:
               (1)  establish the state risk and authorization
  management program as required by Section 2054.0593, Government
  Code, as added by this Act;
               (2)  establish the framework for regional
  cybersecurity working groups to execute mutual aid agreements as
  required under Section 2054.0594(d), Government Code, as added by
  this Act; and
               (3)  establish the Texas volunteer incident response
  team as required by Subchapter N-2, Chapter 2054, Government Code,
  as added by this Act.
         (b)  Each state agency shall ensure that:
               (1)  each contract for cloud computing services the
  agency enters into or renews on or after January 1, 2022, complies
  with Section 2054.0593, Government Code, as added by this Act; and
               (2)  each contract subject to Section 2054.138,
  Government Code, as added by this Act, that is executed on or after
  the effective date of this Act complies with that section.
         (c)  Each state agency subject to Section 2054.137,
  Government Code, as added by this Act, shall designate a data
  management officer as soon as practicable after the effective date
  of this Act.
         (d)  Each state agency subject to Section 2054.161,
  Government Code, as added by this Act, shall ensure each
  information resources technology project initiated on or after the
  effective date of this Act complies with that section.
         SECTION 12.  Not later than October 15, 2022, the Department
  of Information Resources shall submit to the standing committees of
  the senate and house of representatives with primary jurisdiction
  over state agency cybersecurity a report on the department's
  activities and recommendations related to the Texas volunteer
  incident response team established as required by Subchapter N-2,
  Chapter 2054, Government Code, as added by this Act.
         SECTION 13.  Chapter 2062, Government Code, as added by this
  Act, applies only to information acquired, retained, or
  disseminated by a state agency to another person on or after the
  effective date of this Act.
         SECTION 14.  (a) Except as provided by Subsection (b) of
  this section, this Act takes effect immediately if it receives a
  vote of two-thirds of all the members elected to each house, as
  provided by Section 39, Article III, Texas Constitution.  If this
  Act does not receive the vote necessary for immediate effect, this
  Act takes effect September 1, 2021.
         (b)  Chapter 2062, Government Code, as added by this Act,
  takes effect September 1, 2021.
 
  * * * * *