Florida 2022 2022 Regular Session

Florida House Bill H7055 Analysis / Analysis

Filed 02/23/2022

                    This docum ent does not reflect the intent or official position of the bill sponsor or House of Representatives. 
STORAGE NAME: h7055.SAC 
DATE: 2/23/2022 
 
HOUSE OF REPRESENTATIVES STAFF ANALYSIS  
 
BILL #: CS/HB 7055          PCB SAT 22-02    Cybersecurity 
SPONSOR(S): State Affairs Committee, State Administration & Technology Appropriations Subcommittee, 
Giallombardo, Fischer and others 
TIED BILLS:  CS/HB 7057 IDEN./SIM. BILLS: CS/SB 1670 
 
REFERENCE 	ACTION ANALYST STAFF DIRECTOR or 
BUDGET/POLICY CHIEF 
Orig. Comm.: State Administration & Technology 
Appropriations Subcommittee 
14 Y, 0 N Mullins Topp 
1) State Affairs Committee 	23 Y, 0 N, As CS Villa Williamson 
SUMMARY ANALYSIS 
The State Cybersecurity Act requires the Florida Digital Service (FLDS) and the heads of state agencies to meet 
certain requirements to enhance the cybersecurity of state agencies. Currently, state agencies must provide 
cybersecurity training to their employees, report cybersecurity incidents, and adopt cybersecurity standards. 
However, there are no such requirements for counties and municipalities (local governments).  
 
Current law regarding state or local government cybersecurity does not specifically address ransomware, which is a 
form of malware designed to encrypt files on a device, rendering any files unusable. Malicious actors then demand 
ransom in exchange for decryption. 
 
The bill prohibits state agencies and local governments from paying or otherwise complying with a ransomware 
incident. 
 
The bill defines the severity level of a cybersecurity incident in accordance with the National Cyber Incident 
Response Plan. State agencies and local governments must report all ransomware incidents and high severity level 
cybersecurity incidents to the Cybersecurity Operations Center (CSOC) and the Cybercrime Office within the Florida 
Department of Law Enforcement as soon as possible but no later than a time certain. Local governments must also 
report to the sheriff. The bill requires state agencies to report low level cybersecurity incidents and provides that 
local governments may report such incidents. The bill also requires state agencies and local governments to submit 
after-action reports to FLDS following a cybersecurity or ransomware incident. 
 
The bill requires the CSOC to notify the Legislature of high severity level cybersecurity incidents. The notice must 
contain a high-level overview of the incident and its likely effects. In addition, the CSOC must provide the Legislature 
and the Cybersecurity Advisory Council (CAC) with a consolidated incident report on a quarterly basis.  
 
The bill requires state agency and local government employees to undergo certain cybersecurity training within 30 
days of employment and annually thereafter.  
 
The bill requires local governments to adopt cybersecurity standards that safeguard the local government’s data, 
information technology (IT), and IT resources.   
 
The bill expands the purpose of the CAC to include advising local governments on cybersecurity and requires the 
CAC to examine reported cybersecurity and ransomware incidents to develop best practice recommendations. The 
CAC must submit an annual comprehensive report regarding ransomware to the Governor and Legislature.  
 
The bill establishes penalties and fines for certain ransomware offenses against a government entity. 
 
The bill will likely have a negative fiscal impact on state and local government expenditures; however, the bill may 
also have a positive fiscal impact on the state due to the punitive fine established in the bill. See Fiscal Analysis & 
Economic Impact Statement.    STORAGE NAME: h7055.SAC 	PAGE: 2 
DATE: 2/23/2022 
  
FULL ANALYSIS 
I.  SUBSTANTIVE ANALYSIS 
 
A. EFFECT OF PROPOSED CHANGES: 
 
Background 
 
Ransomware 
Ransomware is a form of malware
1
 designed to encrypt files on a device, rendering any files and the 
systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption. 
Ransomware actors often target and threaten to sell or leak exfiltrated data or authentication 
information if the ransom is not paid. In recent years, ransomware incidents have become increasingly 
prevalent among the nation’s state, local, tribal, and territorial government entities and critical 
infrastructure organizations.
2
 In 2021, state chief information officers overwhelmingly named 
ransomware as their top cybersecurity concern.
3
  
 
While most ransomware attacks are not reported in the news, in 2021 at least 2,323 state and local 
governments, schools, and healthcare providers experienced ransomware attacks.
4
 Ransomware 
attacks on such entities have resulted in medical records being inaccessible or permanently lost; 
surgical procedures being canceled, tests postponed, and admissions halted; schools closing; students’ 
grades being lost; 911 services interrupted; police being locked out of background check systems; 
surveillance systems going offline; badge scanners and building access systems ceasing to work; 
property transactions being halted; websites going offline; online payment portals being inaccessible; 
email and phone systems ceasing to work; driver licenses not being issued or renewed; and payments 
to vendors being delayed. 
 
National Institute for Standards and Technology Cybersecurity Framework 
The National Institute for Standards and Technology (NIST) is a non-regulatory federal agency housed 
within the United States Department of Commerce. NIST is charged with providing a prioritized, flexible, 
repeatable, performance-based, and cost-effective framework that helps owners and operators of 
critical infrastructure identify, assess, and manage cyber risk. While the framework was developed with 
critical infrastructure in mind, it can be used by organizations in any sector of the economy or society.
5
 
The framework is designed to complement, and not replace, an organization’s own unique approach to 
cybersecurity risk management. As such, there are a variety of ways to use the framework and the 
decision about how to apply it is left to the implementing organization. For example, an organization 
may use its current processes and consider the framework to identify opportunities to strengthen its 
cybersecurity risk management. Overall, the framework provides an outline of best practices that helps 
organizations decide where to focus resources for cybersecurity protection.
6
 
 
 
 
                                                
1
 “Malware” means hardware, firmware, or software that is intentionally included or inserted in a system for a harmful purpose.  
https://csrc.nist.gov/glossary/term/malware (last visited January 30, 2022). 
2
 Cybersecurity and Infrastructure Agency, Ransomware 101, https://www.cisa.gov/stopransomware/ransomware-101 (last visited 
January 30, 2022).  
3
 National Association of State Chief Information Officers, Driving digital acceleration The 2021 State CIO Survey (October 2021), 
available at https://www.nascio.org/wp-content/uploads/2021/10/2021-State-CIO-Survey.pdf (last visited January 30, 2022).  
4
 Emsisoft Malware Lab, The State of Ransomware in the US: Report and Statistics 2021 (January 18, 2022), available at 
https://blog.emsisoft.com/en/40813/the-state-of-ransomware-in-the-us-report-and-statistics-2021/ (last visited January 30, 2022). 
These numbers do not include ransomware attacks that were reported in the press as cyberattacks or attacks on third party service and 
solution providers. 
5
 National Institute of Standards and Technology, Framework for Improving Critical Infrastructure Cybersecurity, available at 
https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf (last visited January 30, 2022). 
6
 Id.  STORAGE NAME: h7055.SAC 	PAGE: 3 
DATE: 2/23/2022 
  
National Cyber Incident Response Plan 
The National Cyber Incident Response Plan (NCIRP) was developed according to the direction of 
Presidential Policy Directive (PPD)-41,
7
 by the U.S. Department of Homeland Security. The NCIRP is 
part of the broader National Preparedness System and establishes the strategic framework for a whole-
of-Nation approach to mitigating, responding to, and recovering from cybersecurity incidents posing risk 
to critical infrastructure.
8
 The NCIRP is not a tactical or operational plan; rather, it serves as the primary 
strategic framework for stakeholders to understand how federal departments and agencies and other 
national-level partners provide resources to support response operations. The NCIRP was developed in 
coordination with federal, state, local, and private sector entities and is designed to interface with 
industry best practice standards for cybersecurity, including the NIST Cybersecurity Framework. 
 
The NCIRP adopted a common schema for describing the severity of cybersecurity incidents affecting 
the U.S. The schema establishes a common framework to evaluate and assess cybersecurity incidents 
to ensure that all departments and agencies have a common view of the severity of a given incident; 
urgency required for responding to a given incident; seniority level necessary for coordinating response 
efforts; and level of investment required for response efforts.
9
 
 
Figure 1: Cybersecurity Incident Severity Schema  
 
 
 
                                                
7
 Annex for PPD-41: U.S. Cyber Incident Coordination, available at: https://obamawhitehouse.archives.gov/the-press-
office/2016/07/26/annex-presidential-policy-directive-united-states-cyber-incident (last visited February 18, 2022).   
8
 U.S. Department of Homeland Security, National Cyber Incident Response Plan (December 2016) available at: 
file:///C:/Users/Villa.Chris/Downloads/798128%20(7).pdf (last visited February 20, 2022). 
9
 Id.   STORAGE NAME: h7055.SAC 	PAGE: 4 
DATE: 2/23/2022 
  
Information Technology Management 
The Department of Management Services (DMS)
10
 oversees information technology (IT)
11
 governance 
and security for the executive branch of state government. The Florida Digital Service (FLDS) within 
DMS was established by the Legislature in 2020 to replace the Division of State Technology.
12
  The 
head of FLDS is appointed by the Secretary of Management Services
13
 and serves as the state chief 
information officer (CIO).
14
  
 
FLDS was created to propose innovative solutions that securely modernize state government, including 
technology and information services, to achieve value through digital transformation and 
interoperability, and to fully support Florida’s cloud first policy.
15
 Accordingly, DMS through FLDS has 
the following powers, duties, and functions: 
 Develop IT policy for the management of the state’s IT resources.  
 Develop an enterprise architecture.  
 Establish project management and oversight standards with which state agencies
16
 must 
comply when implementing IT projects.  
 Perform project oversight on state agency IT projects that have a total cost of $10 million or 
more and that are funded in the General Appropriations Act or any other law.
17
  
 Identify opportunities for standardization and consolidation of IT services that support 
interoperability, Florida’s cloud first policy, and business functions and operations that are 
common across state agencies.
18
  
 
State Cybersecurity Act 
The State Cybersecurity Act
19
 requires DMS and the heads of state agencies
20
 to meet certain 
requirements to enhance the cybersecurity
21
 of state agencies. Specifically, DMS, acting through FLDS 
must:  
 Establish standards and processes for assessing state agency cybersecurity risks and 
determining appropriate security measures consistent with generally accepted best practices for 
cybersecurity, including the NIST cybersecurity framework. 
 Adopt rules to mitigate risk, support a security governance framework, and safeguard state 
agency digital assets, data,
22
 information, and IT resources
23
 to ensure availability, 
confidentiality, and integrity. 
                                                
10
 See s. 20.22, F.S.  
11
 The term “information technology” means equipment, hardware, software, firmware, programs, systems, networks, infrastructure, 
media, and related material used to automatically, electronically, and wirelessly collect, receive, access, transmit, display, store, 
record, retrieve, analyze, evaluate, process, classify, manipulate, manage, assimilate, control, communicate, exchange, convert, 
converge, interface, switch, or disseminate information of any kind or form. Section 282.0041(20), F.S.  
12
 Ch. 2020-161, L.O.F.  
13
 The Secretary of Management Services serves as the head of DMS and is appointed by the Governor, subject to confirmation by the 
Senate. Section 20.22(1), F.S.  
14
 Section 282.0051(2)(a), F.S.  
15
 Section 282.0051(1), F.S.  
16
 “State agency” means any official, officer, commission, board, authority, council, committee, or department of the executive branch 
of state government; the Justice Administrative Commission; and the Public Service Commission. The term does not include 
university boards of trustees, state universities, the Department of Legal Affairs, the Department of Agriculture and Consumer 
Services, or the Department of Financial Services. Section 282.0041(33), F.S.  
17
 For the Department of Financial Services, the Department of Legal Affairs, and the Department of Agriculture and Consumer 
Services, FDS provides project oversight on IT projects that have a total cost of $20 million or more. Section 282.0051(1)(n), F.S.  
18
 Section 282.0051(1), F.S.  
19
 Section 282.318, F.S.  
20
 For purposes of the State Cybersecurity Act, the term “state agency” includes the Department of Legal Affairs, the Department of 
Agriculture and Consumer Services, and the Department of Financial Services. Section 282.318(2), F.S.  
21
 “Cybersecurity” means the protection afforded to an automated information system in order to attain the applicable objectives of 
preserving the confidentiality, integrity, and availability of data, information, and information technology resources. Section 
282.0041(8), F.S.  
22
 “Data” means a subset of structured information in a format that allows such information to be electronically retrieved and 
transmitted. Section 282.0041(9), F.S.  
23
 “Information technology resources” means data processing hardware and software and services, communications, supplies, 
personnel, facility resources, maintenance, and training. Section 282.0041(22), F.S.   STORAGE NAME: h7055.SAC 	PAGE: 5 
DATE: 2/23/2022 
  
 Designate a chief information security officer (CISO) responsible for the development, 
operation, and oversight of cybersecurity for state technology systems. The CISO must be 
notified of all confirmed or suspected incidents or threats of state agency IT resources and must 
report such information to the CIO and the Governor.  
 Develop and annually update a statewide cybersecurity strategic plan that includes security 
goals and objectives for cybersecurity, including the identification and mitigation of risk, 
proactive protections against threats, tactical risk detection, threat reporting, and response and 
recovery protocols for cyber incidents.
24
 
 Develop and publish for use by state agencies a cybersecurity governance framework. 
 Assist state agencies in complying with the State Cybersecurity Act. 
 In collaboration with the Cybercrime Office within the Florida Department of Law Enforcement 
(FDLE), annually provide training for state agency information security managers and computer 
security incident response team members that contains training on cybersecurity, including 
cybersecurity threats, trends, and best practices. 
 Annually review the strategic and operational cybersecurity plans of state agencies. 
 Track, in coordination with agency inspectors general, state agencies’ implementation of 
remediation plans. 
 Provide cybersecurity training to all state agency technology professionals that develops, 
assesses, and documents competencies by role and skill level. The training may be provided in 
collaboration with the Cybercrime Office, a private sector entity, or an institution of the state 
university system. 
 Operate and maintain a Cybersecurity Operations Center led by the CISO to serve as a 
clearinghouse for threat information and to coordinate with FDLE to support state agency 
response to cybersecurity incidents. 
 Lead an Emergency Support Function under the state comprehensive emergency management 
plan.
25
   
 
The State Cybersecurity Act requires the head of each state agency to designate an information 
security manager to administer the cybersecurity program of the state agency.
26
 In addition, the head of 
each state agency must:  
 Establish an agency cybersecurity incident response team in consultation with FLDS and the 
Cybercrime Office. The agency cybersecurity incident response team must convene upon 
notification of a cybersecurity incident and must immediately report all confirmed or suspected 
incidents to the CISO.  
 Annually submit to DMS the state agency’s strategic and operational cybersecurity plans. 
 Conduct and update every three years a comprehensive risk assessment to determine the 
security threats to the data, information, and IT resources of the state agency. 
 Develop and periodically update written internal policies and procedures, including procedures 
for reporting cybersecurity incidents and breaches to FLDS and the Cybercrime Office.   
 Implement managerial, operational, and technical safeguards and risk assessment remediation 
plans recommended by DMS to address identified risks to the data, information, and IT 
resources of the agency.  
 Ensure that periodic internal audits and evaluations of the agency’s cybersecurity program for 
the data, information, and IT resources of the agency are conducted. 
 Ensure that the cybersecurity requirements in written specifications for the solicitation, 
contracts, and service-level agreement of IT and IT resources and services meet or exceed 
applicable state and federal laws, regulations, and standards for cybersecurity, including the 
NIST cybersecurity framework. 
 Provide cybersecurity awareness training to all state agency employees within 30 days of 
commencing employment concerning cybersecurity risks and the responsibility of employees to 
comply with policies, standards, guidelines, and operating procedures adopted by the state 
                                                
24
 “Incident” means a violation or imminent threat of violation, whether such violation is accidental or deliberate, of information 
technology resources, security, policies, or practices. An imminent threat of violation refers to a situation in which the state agency has 
a factual basis for believing that a specific incident is about to occur. Section 282.0041(19), F.S. 
25
 Section 282.318(3), F.S.  
26
 Section 282.318(4)(a), F.S.   STORAGE NAME: h7055.SAC 	PAGE: 6 
DATE: 2/23/2022 
  
agency to reduce those risks. The training may be provided in collaboration with the Cybercrime 
Office, a private sector entity, or an institution of the state university system. 
 Develop a process that is consistent with the rules and guidelines established by FLDS for 
detecting, reporting, and responding to threats, breaches, or cybersecurity incidents.
27
 
 
Florida Cybersecurity Advisory Council 
The Florida Cybersecurity Advisory Council (CAC) within DMS
28
 assists state agencies in protecting IT 
resources from cyber threats and incidents.
29
 The CAC must assist FLDS in implementing best 
cybersecurity practices, taking into consideration the final recommendations of the Florida 
Cybersecurity Task Force – a task force created to review and assess the state’s cybersecurity 
infrastructure, governance, and operations.
30
 The CAC meets at least quarterly to:  
 Review existing state agency cybersecurity policies. 
 Assess ongoing risks to state agency IT. 
 Recommend a reporting and information sharing system to notify state agencies of new risks. 
 Recommend data breach simulation exercises.  
 Assist FLDS in developing cybersecurity best practice recommendations for state agencies, 
including continuous risk monitoring, password management, and protecting data in legacy and 
new systems. 
 Examine inconsistencies between state and federal law regarding cybersecurity.
31
  
 
The CAC must work with NIST and other federal agencies, private sector businesses, and private 
security experts to identify which local infrastructure sectors, not covered by federal law, are at the 
greatest risk of cyber-attacks and to identify categories of critical infrastructure as critical cyber 
infrastructure if cyber damage to the infrastructure could result in catastrophic consequences.
32
  
 
Beginning June 30, 2022, and each June 30 thereafter, the CAC must submit to the Legislature any 
recommendations considered necessary by the CAC to address cybersecurity.
33
 
 
Offenses against Users of Computers 
Florida law criminalizes the following acts involving a computer,
34
 computer system,
35
 computer 
network,
36
 or electronic device
37
 when done knowingly, willfully, and without authorization: 
 Accessing
38
 or causing to be accessed any computer, computer system, computer network, or 
electronic device with knowledge that such access is unauthorized or the manner or use 
exceeds authorization. 
 Disrupting or denying the ability to transmit data to or from an authorized user of a computer, 
computer system, computer network, or electronic device under certain circumstances. 
                                                
27
 Section 282.318(4), F.S.  
28
 Section 282.319(1), F.S.  
29
 Section 282.319(2), F.S.  
30
 Section 282.319(3), F.S.  
31
 Section 282.319(9), F.S.  
32
 Section 282.319(10), F.S.  
33
 Section 282.319(11), F.S.  
34
 “Computer” means an internally programmed, automatic device that performs data processing. Section 815.03(2), F.S.  
35
 “Computer system” means a device or collection of devices, including support devices, one or more of which contain computer 
programs, electronic instructions, or input data and output data, and which perform functions, including, but not limited to, logic, 
arithmetic, data storage, retrieval, communication, or control. The term does not include calculators that are not programmable and 
that are not capable of being used in conjunction with external files. Section 815.03(7), F.S.  
36
 “Computer network” means a system that provides a medium for communication between one or more computer systems or 
electronic devices, including communication with an input or output device such as a display terminal, printer, or other electronic 
equipment that is connected to the computer systems or electronic devices by physical or wireless telecommunication facilities. 
Section 815.03(4), F.S.  
37
 “Electronic device” means a device or a portion of a device that is designed for and capable of communicating across a computer 
network with other computers or devices for the purpose of transmitting, receiving, or storing data, including, but not limited to, a 
cellular telephone, tablet, or other portable device designed for and capable of communicating with or across a computer network and 
that is actually used for such purpose. Section 815.03(9), F.S.  
38
 “Accessing” means approaching, instructing, communicating with, storing data in, retrieving data from, or otherwise making use of 
any resources of a computer, computer system, computer network, or electronic device. Section 815.03(1), F.S.  STORAGE NAME: h7055.SAC 	PAGE: 7 
DATE: 2/23/2022 
  
 Destroying, taking, injuring, or damaging computers, computer systems, computer networks, or 
electronic devices. 
 Introducing a computer contaminant into a computer, computer system, computer network, or 
electronic device. 
 Engaging in audio or video surveillance of an individual by accessing one of the inherent 
features or components of a computer, computer system, computer network, or electronic 
device, including accessing the data or information stored by a third party.
39
 
 
In general, such conduct against a computer user is a third degree felony,
40
 punishable by up to five 
years in prison and a $5,000 fine.
41
 However, the crime may be enhanced to a second
42
 or first
43
 
degree felony with aggravating factors, such as excessive damage or endangering a human life.
44
 
 
Effect of the Bill 
 
Ransomware Incident 
The bill defines “ransomware incident” to mean a malicious cybersecurity incident in which a person or 
entity introduces software that gains unauthorized access to or encrypts, modifies, or otherwise renders 
unavailable a state agency’s or local government’s
45
 data and thereafter the person or entity demands 
a ransom to restore access to the data, prevent publication of the data, or otherwise remediate the 
impact of the software. The bill prohibits a state agency or local government experiencing a 
ransomware incident from paying or otherwise complying with the demanded ransom.  
 
Cybersecurity and Ransomware Incident Notification 
The bill defines the severity level of a cybersecurity incident in accordance with the NCIRP as follows: 
 Level 5: An emergency-level incident within the specified jurisdiction if the incident poses an 
imminent threat to the provision of wide-scale critical infrastructure services; national, state, or 
local security; or the lives of the country’s, state’s, or local government’s citizens. 
 Level 4: A severe-level incident if the incident is likely to result in a significant impact within the 
affected jurisdiction which affects the public health or safety; national, state, or local security; 
economic security; or individual civil liberties. 
 Level 3: A high-level incident if the incident is likely to result in a demonstrable impact in the 
affected jurisdiction to public health or safety; national, state, or local security; economic 
security; civil liberties; or public confidence. 
 Level 2: A medium-level incident if the incident may impact public health or safety; national, 
state, or local security; economic security; civil liberties; or public confidence. 
 Level 1: A low-level incident if the incident is unlikely to impact public health or safety; national, 
state, or local security; economic security; or public confidence. 
 
The bill requires state agencies and local governments to report all ransomware incidents as soon as 
possible, but no later than 12 hours after discovery of the incident. It also requires state agencies and 
local governments to report cybersecurity incidents determined to be of severity level three, four, or five 
as soon as possible, but no later than 48 hours after discovery of the incident. Local governments may 
report cybersecurity incidents determined to be of severity level one or two and state agencies are 
required to report such incidents as soon as possible. State agencies and local governments report the 
incidents to the CSOC and Cybercrime Office; however, local governments are also required to report 
to the sheriff that has jurisdiction over the local government.  
 
The bill specifies the information that must be reported in a cybersecurity or ransomware incident report 
by a state agency or local government. The incident report must include, at a minimum: 
                                                
39
 Section 815.06(2), F.S.  
40
 Section 815.06(3)(a), F.S. 
41
 Section 775.082 and 775.083, F.S.  
42
 A second degree felony is punishable by up to 15 years in prison and a $10,000 fine. Sections 775.082 and 775.083, F.S. 
43
 A first degree felony is punishable by up to 30 years in prison and a $10,000 fine. Sections 775.082 and 775.083, F.S.  
44
 Section 815.06(3)(b) and (3)(c), F.S.  
45
 The bill defines “local government” to mean a county or a municipality.   STORAGE NAME: h7055.SAC 	PAGE: 8 
DATE: 2/23/2022 
  
 A summary of the facts surrounding the cybersecurity or ransomware incident. 
 The date on which the state agency or local government most recently backed up its data, the 
physical location of the backup, if the backup was affected, and if the backup was created 
using cloud computing.  
 The types of data compromised by the cybersecurity or ransomware incident. 
 The estimated fiscal impact of the cybersecurity or ransomware incident.  
 In the case of a ransomware incident, the details of the ransom demanded. 
 If the reporting entity is a local government, a statement requesting or declining assistance 
from the CSOC, Cybercrime Office, or sheriff. 
 
The bill requires the CSOC to notify the President of the Senate and the Speaker of the House of 
Representatives of any cybersecurity incident with a severity level of three, four, or five within 12 hours 
of receiving the state agency or local government incident report. The notification must include a high-
level description of the incident and the likely effects. In addition, the CSOC must provide consolidated 
incident reports to the President of the Senate, Speaker of the House of Representatives, and CAC on 
a quarterly basis. The consolidated incident reports to the CAC may not contain any state agency or 
local government name, network information, or system identifying information, but must contain 
sufficient relevant information to allow the CAC to fulfill its responsibilities.  
 
After-action Reports 
The bill requires state agencies and local governments to submit an after-action report to FLDS within 
one week of the remediation of a cybersecurity or ransomware incident. The after-action report must 
summarize the incident, the incident’s resolution, and any insights gained as a result of the incident. By 
December 1, 2022, FLDS must establish guidelines and processes for submitting after-action reports.   
 
Cybersecurity Training  
The bill requires FLDS to develop a basic and advanced cybersecurity training curriculum. All local 
government employees with access to the local government’s network must complete the basic training 
curriculum, and local government technology professionals and employees with access to highly 
sensitive information must complete the advanced training curriculum. The trainings must be completed 
by employees within 30 days of commencing employment and on an annual basis thereafter. The bill 
authorizes FLDS to provide the cybersecurity trainings in collaboration with the Cybercrime Office, a 
private sector entity, or an institution of the State University System. 
 
The bill requires the advanced cybersecurity training currently provided by FLDS to state agency 
technology professionals to be provided on an annual basis and to be provided to employees with 
access to highly sensitive information. In addition, state agency heads must provide the basic 
cybersecurity training that is currently provided to agency employees on an annual basis.   
 
The bill requires the advanced cybersecurity training curriculum provided to certain state and local 
government employees to include training on the identification of each cybersecurity incident severity 
level. 
 
Local Government Cybersecurity Standards 
The bill requires local governments to adopt cybersecurity standards that safeguard the local 
government’s data, IT, and IT resources to ensure availability, confidentiality, and integrity. The 
standards must be consistent with generally accepted best practices for cybersecurity, including the 
NIST cybersecurity framework. Counties with a population of 75,000 or more and municipalities with a 
population of 25,000 or more must adopt the standards by January 1, 2024. Counties with a population 
less than 75,000 and municipalities with a population less than 25,000 must adopt the standards by 
January 1, 2025. The bill requires each local government to notify FLDS when it has adopted the 
standards. 
 
Florida Cybersecurity Advisory Council  
The bill provides that one of the purposes of the CAC is to advise local governments on cybersecurity, 
including cybersecurity threats, trends, and best practices. In addition, the bill requires the CAC to 
review information relating to cybersecurity and ransomware incidents reported by state agencies and  STORAGE NAME: h7055.SAC 	PAGE: 9 
DATE: 2/23/2022 
  
local governments to determine commonalities and develop best practice recommendations for those 
entities. The CAC must recommend any additional information that should be reported by a local 
government to FLDS as part of a cybersecurity or ransomware incident report.   
 
Beginning December 1, 2022, and each December 1 thereafter, the CAC must prepare and submit a 
comprehensive report to the Governor, the President of the Senate, and the Speaker of the House of 
Representatives that includes data, trends, analysis, findings, and recommendations for state and local 
action regarding ransomware incidents. At a minimum, the report must include: 
 Descriptive statistics, including the amount of ransom requested, duration of the incident, and 
overall monetary cost to taxpayers of the incident.  
 A detailed statistical analysis of the circumstances that lead to the ransomware incident which 
does not include the name of the state agency or local government, network information, or 
system identifying information. 
 Statistical analysis of the level of cybersecurity employee training and frequency of data backup 
for the state agencies or local governments that reported incidents.  
 Specific issues identified with current policy, procedure, rule, or statute and recommendations to 
address those issues.  
 Other recommendations to prevent ransomware incidents. 
 
The bill specifies that, for purposes of the CAC’s charter, the term “state agency” includes the 
Department of Legal Affairs, the Department of Agriculture and Consumer Services, and the 
Department of Financial Services.  
 
Ransomware Offense  
The bill provides that a person who willfully, knowingly, and without authorization introduces a computer 
contaminant that gains unauthorized access to, encrypts, modifies, or otherwise renders unavailable 
data, programs, or supporting documentation residing or existing within a computer, computer system, 
computer network, or electronic device owned or operated by a government entity
46
 and demands a 
ransom to prevent the publication of or restore access to the data, programs, or supporting 
documentation or to otherwise remediate the impact of the computer contaminant commits a 
ransomware offense. The bill provides that a ransomware offense is punishable as a first degree felony. 
The bill further provides that an employee or contractor of a government entity, with access to the 
government entity’s network, who willfully and knowingly aids or abets another in the commission of a 
ransomware offense against the government entity commits a felony of the first degree. In addition to 
any other penalties imposed, the convicted person must pay a fine equal to twice the amount 
demanded in the ransomware offense, the proceeds of which will be deposited into the General 
Revenue Fund. 
 
B. SECTION DIRECTORY: 
Section 1 amends s. 282.0041, F.S., relating to definitions.  
 
Section 2 amends s. 282.318, F.S., relating to cybersecurity.  
 
Section 3 creates s. 282.3185, F.S., relating to local government cybersecurity.  
 
Section 4 creates s. 282.3186, F.S., relating to ransomware incident compliance.  
 
Section 5 amends s. 282.319, F.S., relating to the Florida Cybersecurity Advisory Council.  
 
Section 6 creates s. 815.062, F.S., relating to offenses against governmental entities.  
 
Section 7 creates an unnumbered section of law providing that the Legislature finds that the act fulfills 
an important state interest.  
                                                
46
 The bill defines the term “government entity” to mean any official, officer, commission, board, authority, council, committee, or 
department of the executive, judicial, or legislative branch of state government; state universities; and any county or municipality, 
special district, water management district, and any other district in this state.   STORAGE NAME: h7055.SAC 	PAGE: 10 
DATE: 2/23/2022 
  
 
Section 8 provides an effective date of July 1, 2022. 
II.  FISCAL ANALYSIS & ECONOMIC IMPACT STATEMENT 
 
A. FISCAL IMPACT ON STATE GOVERNMENT: 
 
1. Revenues: 
The bill establishes a punitive fine for a person convicted of a ransomware offense against a 
government entity. Moneys recovered pursuant to the punitive fine are to be deposited into the 
General Revenue Fund. Accordingly, the bill may have an indeterminate positive fiscal impact on 
the state. 
 
2. Expenditures: 
The bill places additional requirements on state agencies including submitting after action-reports 
and providing cybersecurity training on an annual basis. In addition, the bill expands the functions of 
the CAC to include advising counties and municipalities on cybersecurity, and prohibits state 
agencies from paying or otherwise complying with a ransomware incident ransom. See Fiscal 
Comments. 
 
B. FISCAL IMPACT ON LOCAL GOVERNMENTS: 
 
1. Revenues: 
None. 
 
2. Expenditures: 
The bill places a number of requirements on local governments regarding cybersecurity, including 
completing cybersecurity trainings, adopting cybersecurity standards, reporting ransomware and 
certain cybersecurity incidents, and submitting after-action reports. In addition, the bill prohibits 
certain local governments from paying or otherwise complying with a ransomware incident ransom. 
See Fiscal Comments. 
 
C. DIRECT ECONOMIC IMPACT ON PRIVATE SECTOR: 
None.  
 
D. FISCAL COMMENTS: 
The proposed House of Representatives FY 2022-2023 General Appropriations Act (GAA) is 
anticipated to: 
 Fund $30 million in nonrecurring General Revenue for DMS to administer a grants program that 
provides cybersecurity technical assistance to counties and municipalities, 
 Fund $5,428,240 in federal trust fund budget authority for DMS to distribute cybersecurity 
assistance grants from the federal Infrastructure Investment and Jobs Act based on guidance 
provided by the Cybersecurity and Infrastructure Security Agency and the Federal Emergency 
Management Agency
 47
,  
 Transfer $7 million in nonrecurring General Revenue to the Florida Center for Cybersecurity at 
the University of South Florida, in consultation with the Florida Cybersecurity Advisory Council, 
to conduct a comprehensive assessment of the state’s critical infrastructure and provide 
recommendations for improvement of the state’s preparedness and resilience to significant 
cybersecurity incidents, and  
 Transfer $30 million in nonrecurring General Revenue to the Florida Center for Cybersecurity at 
the University of South Florida, in consultation with DMS and the Florida Cybersecurity Advisory 
                                                
47
 Infrastructure Investment and Jobs Act, Pub. L. No. 117-58, H.R. 3684, 117th Cong. (11/15/2021). This funding is contingent on 
federal grants being awarded.  STORAGE NAME: h7055.SAC 	PAGE: 11 
DATE: 2/23/2022 
  
Council, to provide cybersecurity training to state and local government executive, managerial, 
technical, and general staff. 
III.  COMMENTS 
 
A. CONSTITUTIONAL ISSUES: 
 
 1. Applicability of Municipality/County Mandates Provision: 
The county/municipality mandates provision of Art. VII, s. 18 of the Florida Constitution may apply 
because the bill places cybersecurity related requirements on local governments, including 
completing cybersecurity trainings, adopting cybersecurity standards, reporting ransomware and 
certain cybersecurity incidents, and submitting after-action reports; however, an exemption may 
apply if the costs related to those cybersecurity requirements are insignificant. An exception may 
apply because similarly situated entities are required to comply with the same cybersecurity 
requirements and the bill provides an important state interest determination. An exception may also 
apply because the General Appropriations Act provides estimated funds to cover the mandate. 
 
 2. Other: 
None.  
 
B. RULE-MAKING AUTHORITY: 
The bill grants rulemaking authority to FLDS to establish guidelines and processes for local 
governments to use when submitting after-action reports.  
 
C. DRAFTING ISSUES OR OTHER COMMENTS: 
None. 
IV.  AMENDMENTS/COMMITTEE SUBSTITUTE CHANGES 
On February 23, 2022, the State Affairs Committee adopted a proposed committee substitute (PCS) 
and reported the bill favorably as a committee substitute. The PCS differed from the bill in that it: 
 Defined the level of severity of a cybersecurity incident in accordance with the U.S. Department 
of Homeland Security’s National Cyber Incident Response Plan; 
 Required the advanced cybersecurity training offered to specified state agency and local 
government employees to include training on the cybersecurity incident severity levels; 
 Differentiated reporting requirements based on the level of severity of a cybersecurity incident; 
 Required the Legislature to only be notified of high severity level cybersecurity incidents; and 
 Required the CSOC to provide the Legislature and CAC with a consolidated incident report on a 
quarterly basis.  
 
This analysis is drafted to the committee substitute adopted by the State Affairs Committee.