15 | 15 | | An act relating to cybersecurity; amending s. 2 |
---|
16 | 16 | | 282.0041, F.S.; providing and revising definitions; 3 |
---|
17 | 17 | | amending s. 282.318, F.S.; requiring the Department of 4 |
---|
18 | 18 | | Management Services, acting through the Florida 5 |
---|
19 | 19 | | Digital Service, to develop and publish guidelines and 6 |
---|
20 | 20 | | processes for reporting cybersecurity incidents; 7 |
---|
21 | 21 | | requiring state agencies to report ransomware 8 |
---|
22 | 22 | | incidents and certain cybersecurity incidents to 9 |
---|
23 | 23 | | certain entities within specified timeframes; 10 |
---|
24 | 24 | | requiring the Cybersecurity Operations Center to 11 |
---|
25 | 25 | | provide certain notifications to the Legislature 12 |
---|
26 | 26 | | within a specified timeframe; requiring the 13 |
---|
27 | 27 | | Cybersecurity Operations Center to quarterly provide 14 |
---|
28 | 28 | | certain reports to the Legislature and the Florida 15 |
---|
29 | 29 | | Cybersecurity Advisory Council; requiring the 16 |
---|
30 | 30 | | department, acting through the Florida Digital 17 |
---|
31 | 31 | | Service, to develop and publish guidelines and 18 |
---|
32 | 32 | | processes by a specified date for submitting after -19 |
---|
33 | 33 | | action reports and annually provide cybersecurity 20 |
---|
34 | 34 | | training to certain persons; requiring state agency 21 |
---|
35 | 35 | | heads to annually provide cybersecurity awareness 22 |
---|
36 | 36 | | training to certain persons; requiring state agencies 23 |
---|
37 | 37 | | to report cybersecurity incidents and ransomware 24 |
---|
38 | 38 | | incidents in compliance with certain procedures and 25 |
---|
46 | 46 | | Page 2 of 20 |
---|
47 | 47 | | F L O R I D A H O U S E O F R E P R E S E N T A T I V E S |
---|
48 | 48 | | |
---|
49 | 49 | | |
---|
50 | 50 | | |
---|
51 | 51 | | timeframes; requiring state agency heads to submit 26 |
---|
52 | 52 | | certain after-action reports to the Flo rida Digital 27 |
---|
53 | 53 | | Service within a specified timeframe; creating s. 28 |
---|
54 | 54 | | 282.3185, F.S.; providing a short title; providing a 29 |
---|
55 | 55 | | definition; requiring the Florida Digital Service to 30 |
---|
56 | 56 | | develop certain cybersecurity training curricula; 31 |
---|
57 | 57 | | requiring certain persons to complete certain 32 |
---|
58 | 58 | | cybersecurity training within a specified timeframe 33 |
---|
59 | 59 | | and annually thereafter; authorizing the Florida 34 |
---|
60 | 60 | | Digital Service to provide certain training in 35 |
---|
61 | 61 | | collaboration with certain entities; requiring certain 36 |
---|
62 | 62 | | local governments to adopt certain cybersecu rity 37 |
---|
63 | 63 | | standards by specified dates; requiring local 38 |
---|
64 | 64 | | governments to provide certain notification to the 39 |
---|
65 | 65 | | Florida Digital Service and certain entities; 40 |
---|
66 | 66 | | providing notification requirements; requiring local 41 |
---|
67 | 67 | | governments to report ransomware incidents and certain 42 |
---|
68 | 68 | | cybersecurity incidents to certain entities within 43 |
---|
69 | 69 | | specified timeframes; requiring the Cybersecurity 44 |
---|
70 | 70 | | Operations Center to provide certain notification to 45 |
---|
71 | 71 | | the Legislature within a specified timeframe; 46 |
---|
72 | 72 | | authorizing local governments to report certain 47 |
---|
73 | 73 | | cybersecurity incidents to certain entities; requiring 48 |
---|
74 | 74 | | the Cybersecurity Operations Center to quarterly 49 |
---|
75 | 75 | | provide certain reports to the Legislature and the 50 |
---|
83 | 83 | | Page 3 of 20 |
---|
84 | 84 | | F L O R I D A H O U S E O F R E P R E S E N T A T I V E S |
---|
85 | 85 | | |
---|
86 | 86 | | |
---|
87 | 87 | | |
---|
88 | 88 | | Florida Cybersecurity Advisory Council; requiring 51 |
---|
89 | 89 | | local governments to submit after -action reports 52 |
---|
90 | 90 | | containing certain information to the Florida Digital 53 |
---|
91 | 91 | | Service within a specified timeframe; requiring the 54 |
---|
92 | 92 | | Florida Digital Service to establish certain 55 |
---|
93 | 93 | | guidelines and processes by a specified date; creating 56 |
---|
94 | 94 | | s. 282.3186, F.S.; prohibiting certain entities from 57 |
---|
95 | 95 | | paying or otherwise complying with a ransom demand; 58 |
---|
96 | 96 | | amending s. 282.319, F.S.; revising the purpose of the 59 |
---|
97 | 97 | | Florida Cybersecurity Advisory Council to include 60 |
---|
98 | 98 | | advising counties and municipalities on cybersecurity; 61 |
---|
99 | 99 | | requiring the council to meet at least quarterly to 62 |
---|
100 | 100 | | review certain information and develop and make 63 |
---|
101 | 101 | | certain recommendations; requiring the council to 64 |
---|
102 | 102 | | annually submit to the Governor and the Legislature a 65 |
---|
103 | 103 | | certain ransomware incident report beginning on a 66 |
---|
104 | 104 | | specified date; providing requirements for the report ; 67 |
---|
105 | 105 | | providing a definition; creating s. 815.062, F.S.; 68 |
---|
106 | 106 | | providing a definition; providing criminal penalties; 69 |
---|
107 | 107 | | requiring a person convicted of certain offenses to 70 |
---|
108 | 108 | | pay a certain fine; requiring deposit of certain 71 |
---|
109 | 109 | | moneys in the General Revenue Fund; providing a 72 |
---|
110 | 110 | | legislative finding and declaration of an important 73 |
---|
111 | 111 | | state interest; providing an effective date. 74 |
---|
112 | 112 | | 75 |
---|
120 | 120 | | Page 4 of 20 |
---|
121 | 121 | | F L O R I D A H O U S E O F R E P R E S E N T A T I V E S |
---|
122 | 122 | | |
---|
123 | 123 | | |
---|
124 | 124 | | |
---|
125 | 125 | | Be It Enacted by the Legislature of the State of Florida: 76 |
---|
126 | 126 | | 77 |
---|
127 | 127 | | Section 1. Subsections (28) through (37) of section 78 |
---|
128 | 128 | | 282.0041, Florida Statutes, are renumbe red as subsections (29) 79 |
---|
129 | 129 | | through (38), respectively, subsection (19) is amended, and a 80 |
---|
130 | 130 | | new subsection (28) is added to that section, to read: 81 |
---|
131 | 131 | | 282.0041 Definitions. —As used in this chapter, the term: 82 |
---|
132 | 132 | | (19) "Incident" means a violation or imminent threat o f 83 |
---|
133 | 133 | | violation, whether such violation is accidental or deliberate, 84 |
---|
134 | 134 | | of information technology resources, security, policies, or 85 |
---|
135 | 135 | | practices. An imminent threat of violation refers to a situation 86 |
---|
136 | 136 | | in which a the state agency, county, or municipality has a 87 |
---|
137 | 137 | | factual basis for believing that a specific incident is about to 88 |
---|
138 | 138 | | occur. 89 |
---|
139 | 139 | | (28) "Ransomware incident" means a malicious cybersecurity 90 |
---|
140 | 140 | | incident in which a person or entity introduces software that 91 |
---|
141 | 141 | | gains unauthorized access to or encrypts, modifies, or otherwise 92 |
---|
142 | 142 | | renders unavailable a state agency's, county's, or 93 |
---|
143 | 143 | | municipality's data and thereafter the person or entity demands 94 |
---|
144 | 144 | | a ransom to prevent the publication of the data, restore access 95 |
---|
145 | 145 | | to the data, or otherwise remediate the impact of the software. 96 |
---|
146 | 146 | | Section 2. Paragraphs (c) and (g) of subsection (3) and 97 |
---|
147 | 147 | | paragraphs (i) and (j) of subsection (4) of section 282.318, 98 |
---|
148 | 148 | | Florida Statutes, are amended, and paragraph (k) is added to 99 |
---|
149 | 149 | | subsection (4) of that section, to read: 100 |
---|
157 | 157 | | Page 5 of 20 |
---|
158 | 158 | | F L O R I D A H O U S E O F R E P R E S E N T A T I V E S |
---|
159 | 159 | | |
---|
160 | 160 | | |
---|
161 | 161 | | |
---|
162 | 162 | | 282.318 Cybersecurity. — 101 |
---|
163 | 163 | | (3) The department, a cting through the Florida Digital 102 |
---|
164 | 164 | | Service, is the lead entity responsible for establishing 103 |
---|
165 | 165 | | standards and processes for assessing state agency cybersecurity 104 |
---|
166 | 166 | | risks and determining appropriate security measures. Such 105 |
---|
167 | 167 | | standards and processes must be consistent with generally 106 |
---|
168 | 168 | | accepted technology best practices, including the National 107 |
---|
169 | 169 | | Institute for Standards and Technology Cybersecurity Framework, 108 |
---|
170 | 170 | | for cybersecurity. The department, acting through the Florida 109 |
---|
171 | 171 | | Digital Service, shall adopt rules that mitigate risks; 110 |
---|
172 | 172 | | safeguard state agency digital assets, data, information, and 111 |
---|
173 | 173 | | information technology resources to ensure availability, 112 |
---|
174 | 174 | | confidentiality, and integrity; and support a security 113 |
---|
175 | 175 | | governance framework. The department, acting through the Florida 114 |
---|
176 | 176 | | Digital Service, shall also: 115 |
---|
177 | 177 | | (c) Develop and publish for use by state agencies a 116 |
---|
178 | 178 | | cybersecurity governance framework that, at a minimum, includes 117 |
---|
179 | 179 | | guidelines and processes for: 118 |
---|
180 | 180 | | 1. Establishing asset management procedures to ensure that 119 |
---|
181 | 181 | | an agency's information technology resources are identified and 120 |
---|
182 | 182 | | managed consistent with their relative importance to the 121 |
---|
183 | 183 | | agency's business objectives. 122 |
---|
184 | 184 | | 2. Using a standard risk assessment methodology that 123 |
---|
185 | 185 | | includes the identification of an agency's priorities, 124 |
---|
186 | 186 | | constraints, risk tolerances, and assumptions necessary to 125 |
---|
194 | 194 | | Page 6 of 20 |
---|
195 | 195 | | F L O R I D A H O U S E O F R E P R E S E N T A T I V E S |
---|
196 | 196 | | |
---|
197 | 197 | | |
---|
198 | 198 | | |
---|
199 | 199 | | support operational risk decisions. 126 |
---|
200 | 200 | | 3. Completing comprehensive risk assessments and 127 |
---|
201 | 201 | | cybersecurity audits, which may be completed by a private sector 128 |
---|
202 | 202 | | vendor, and submitting completed assessments and audits to the 129 |
---|
203 | 203 | | department. 130 |
---|
204 | 204 | | 4. Identifying protection procedures to manage the 131 |
---|
205 | 205 | | protection of an agency's information, data, and information 132 |
---|
206 | 206 | | technology resources. 133 |
---|
207 | 207 | | 5. Establishing procedures for accessing information and 134 |
---|
208 | 208 | | data to ensure the confidentiality, integrity, and availability 135 |
---|
209 | 209 | | of such information and data. 136 |
---|
210 | 210 | | 6. Detecting threats through proactive monitoring of 137 |
---|
211 | 211 | | events, continuous security monitoring, and defined detection 138 |
---|
212 | 212 | | processes. 139 |
---|
213 | 213 | | 7. Establishing agency cybersecurity incident response 140 |
---|
214 | 214 | | teams and describing their r esponsibilities for responding to 141 |
---|
215 | 215 | | cybersecurity incidents, including breaches of personal 142 |
---|
216 | 216 | | information containing confidential or exempt data. 143 |
---|
217 | 217 | | 8. Recovering information and data in response to a 144 |
---|
218 | 218 | | cybersecurity incident. The recovery may include recommended 145 |
---|
219 | 219 | | improvements to the agency processes, policies, or guidelines. 146 |
---|
220 | 220 | | 9. Establishing a cybersecurity incident reporting process 147 |
---|
221 | 221 | | that includes procedures and tiered reporting timeframes for 148 |
---|
222 | 222 | | notifying the department and the Department of Law Enforcement 149 |
---|
223 | 223 | | of cybersecurity incidents. The tiered reporting timeframes 150 |
---|
231 | 231 | | Page 7 of 20 |
---|
232 | 232 | | F L O R I D A H O U S E O F R E P R E S E N T A T I V E S |
---|
233 | 233 | | |
---|
234 | 234 | | |
---|
235 | 235 | | |
---|
236 | 236 | | shall be based upon the level of severity of the cybersecurity 151 |
---|
237 | 237 | | incidents being reported. 152 |
---|
238 | 238 | | a. The level of severity of the cybersecurity incident is 153 |
---|
239 | 239 | | defined by the National Cyber Incident Response Plan o f the 154 |
---|
240 | 240 | | United States Department of Homeland Security as follows: 155 |
---|
241 | 241 | | (I) Level 5 is an emergency -level incident within the 156 |
---|
242 | 242 | | specified jurisdiction that poses an imminent threat to the 157 |
---|
243 | 243 | | provision of wide-scale critical infrastructure services; 158 |
---|
244 | 244 | | national, state, or local government security; or the lives of 159 |
---|
245 | 245 | | the country's, state's, or local government's residents. 160 |
---|
246 | 246 | | (II) Level 4 is a severe -level incident that is likely to 161 |
---|
247 | 247 | | result in a significant impact in the affected jurisdiction to 162 |
---|
248 | 248 | | public health or safety; nation al, state, or local security; 163 |
---|
249 | 249 | | economic security; or civil liberties. 164 |
---|
250 | 250 | | (III) Level 3 is a high -level incident that is likely to 165 |
---|
251 | 251 | | result in a demonstrable impact in the affected jurisdiction to 166 |
---|
252 | 252 | | public health or safety; national, state, or local security; 167 |
---|
253 | 253 | | economic security; civil liberties; or public confidence. 168 |
---|
254 | 254 | | (IV) Level 2 is a medium -level incident that may impact 169 |
---|
255 | 255 | | public health or safety; national, state, or local security; 170 |
---|
256 | 256 | | economic security; civil liberties; or public confidence. 171 |
---|
257 | 257 | | (V) Level 1 is a low -level incident that is unlikely to 172 |
---|
258 | 258 | | impact public health or safety; national, state, or local 173 |
---|
259 | 259 | | security; economic security; civil liberties; or public 174 |
---|
260 | 260 | | confidence. 175 |
---|
268 | 268 | | Page 8 of 20 |
---|
269 | 269 | | F L O R I D A H O U S E O F R E P R E S E N T A T I V E S |
---|
270 | 270 | | |
---|
271 | 271 | | |
---|
272 | 272 | | |
---|
273 | 273 | | b. The cybersecurity incident reporting process must 176 |
---|
274 | 274 | | specify the information that must be repo rted by a state agency 177 |
---|
275 | 275 | | following a cybersecurity incident or ransomware incident, 178 |
---|
276 | 276 | | which, at a minimum, must include the following: 179 |
---|
277 | 277 | | (I) A summary of the facts surrounding the cybersecurity 180 |
---|
278 | 278 | | incident or ransomware incident. 181 |
---|
279 | 279 | | (II) The date on which the stat e agency most recently 182 |
---|
280 | 280 | | backed up its data, the physical location of the backup, if the 183 |
---|
281 | 281 | | backup was affected, and if the backup was created using cloud 184 |
---|
282 | 282 | | computing. 185 |
---|
283 | 283 | | (III) The types of data compromised by the cybersecurity 186 |
---|
284 | 284 | | incident or ransomware incident. 187 |
---|
285 | 285 | | (IV) The estimated fiscal impact of the cybersecurity 188 |
---|
286 | 286 | | incident or ransomware incident. 189 |
---|
287 | 287 | | (V) In the case of a ransomware incident, the details of 190 |
---|
288 | 288 | | the ransom demanded. 191 |
---|
289 | 289 | | c.(I) A state agency shall report all ransomware incidents 192 |
---|
290 | 290 | | and any cybersecurity inciden t determined by the state agency to 193 |
---|
291 | 291 | | be of severity level 3, 4, or 5 to the Cybersecurity Operations 194 |
---|
292 | 292 | | Center and the Cybercrime Office of the Department of Law 195 |
---|
293 | 293 | | Enforcement as soon as possible but no later than 48 hours after 196 |
---|
294 | 294 | | discovery of the cybersecurity in cident and no later than 12 197 |
---|
295 | 295 | | hours after discovery of the ransomware incident. The report 198 |
---|
296 | 296 | | must contain the information required in sub -subparagraph b. 199 |
---|
297 | 297 | | (II) The Cybersecurity Operations Center shall notify the 200 |
---|
305 | 305 | | Page 9 of 20 |
---|
306 | 306 | | F L O R I D A H O U S E O F R E P R E S E N T A T I V E S |
---|
307 | 307 | | |
---|
308 | 308 | | |
---|
309 | 309 | | |
---|
310 | 310 | | President of the Senate and the Speaker of the House of 201 |
---|
311 | 311 | | Representatives of any severity level 3, 4, or 5 incident as 202 |
---|
312 | 312 | | soon as possible but no later than 12 hours after receiving a 203 |
---|
313 | 313 | | state agency's incident report. The notification must include a 204 |
---|
314 | 314 | | high-level description of the incident and the likely effec ts. 205 |
---|
315 | 315 | | d. A state agency shall report a cybersecurity incident 206 |
---|
316 | 316 | | determined by the state agency to be of severity level 1 or 2 to 207 |
---|
317 | 317 | | the Cybersecurity Operations Center and the Cybercrime Office of 208 |
---|
318 | 318 | | the Department of Law Enforcement as soon as possible. The 209 |
---|
319 | 319 | | report must contain the information required in sub -subparagraph 210 |
---|
320 | 320 | | b. 211 |
---|
321 | 321 | | e. The Cybersecurity Operations Center shall provide a 212 |
---|
322 | 322 | | consolidated incident report on a quarterly basis to the 213 |
---|
323 | 323 | | President of the Senate, the Speaker of the House of 214 |
---|
324 | 324 | | Representatives, and the F lorida Cybersecurity Advisory Council. 215 |
---|
325 | 325 | | The report provided to the Florida Cybersecurity Advisory 216 |
---|
326 | 326 | | Council may not contain the name of any agency, network 217 |
---|
327 | 327 | | information, or system identifying information but must contain 218 |
---|
328 | 328 | | sufficient relevant information to allo w the Florida 219 |
---|
329 | 329 | | Cybersecurity Advisory Council to fulfill its responsibilities 220 |
---|
330 | 330 | | as required in s. 282.319(9). 221 |
---|
331 | 331 | | 10. Incorporating information obtained through detection 222 |
---|
332 | 332 | | and response activities into the agency's cybersecurity incident 223 |
---|
333 | 333 | | response plans. 224 |
---|
334 | 334 | | 11. Developing agency strategic and operational 225 |
---|
342 | 342 | | Page 10 of 20 |
---|
343 | 343 | | F L O R I D A H O U S E O F R E P R E S E N T A T I V E S |
---|
344 | 344 | | |
---|
345 | 345 | | |
---|
346 | 346 | | |
---|
347 | 347 | | cybersecurity plans required pursuant to this section. 226 |
---|
348 | 348 | | 12. Establishing the managerial, operational, and 227 |
---|
349 | 349 | | technical safeguards for protecting state government data and 228 |
---|
350 | 350 | | information technology resources that align wi th the state 229 |
---|
351 | 351 | | agency risk management strategy and that protect the 230 |
---|
352 | 352 | | confidentiality, integrity, and availability of information and 231 |
---|
353 | 353 | | data. 232 |
---|
354 | 354 | | 13. Establishing procedures for procuring information 233 |
---|
355 | 355 | | technology commodities and services that require the commodity 234 |
---|
356 | 356 | | or service to meet the National Institute of Standards and 235 |
---|
357 | 357 | | Technology Cybersecurity Framework. 236 |
---|
358 | 358 | | 14. Submitting after -action reports following a 237 |
---|
359 | 359 | | cybersecurity incident or ransomware incident. Such guidelines 238 |
---|
360 | 360 | | and processes for submitting after -action reports must be 239 |
---|
361 | 361 | | developed and published by December 1, 2022. 240 |
---|
362 | 362 | | (g) Annually provide cybersecurity training to all state 241 |
---|
363 | 363 | | agency technology professionals and employees with access to 242 |
---|
364 | 364 | | highly sensitive information which that develops, assesses, and 243 |
---|
365 | 365 | | documents competencies by role and skill level. The 244 |
---|
366 | 366 | | cybersecurity training curriculum must include training on the 245 |
---|
367 | 367 | | identification of each cybersecurity incident severity level 246 |
---|
368 | 368 | | referenced in sub-subparagraph (c)9.a. The training may be 247 |
---|
369 | 369 | | provided in collaboration with the Cybe rcrime Office of the 248 |
---|
370 | 370 | | Department of Law Enforcement, a private sector entity, or an 249 |
---|
371 | 371 | | institution of the State University System. 250 |
---|
379 | 379 | | Page 11 of 20 |
---|
380 | 380 | | F L O R I D A H O U S E O F R E P R E S E N T A T I V E S |
---|
381 | 381 | | |
---|
382 | 382 | | |
---|
383 | 383 | | |
---|
384 | 384 | | (4) Each state agency head shall, at a minimum: 251 |
---|
385 | 385 | | (i) Provide cybersecurity awareness training to all state 252 |
---|
386 | 386 | | agency employees within in the first 30 days after commencing 253 |
---|
387 | 387 | | employment, and annually thereafter, concerning cybersecurity 254 |
---|
388 | 388 | | risks and the responsibility of employees to comply with 255 |
---|
389 | 389 | | policies, standards, guidelines, and operating procedures 256 |
---|
390 | 390 | | adopted by the state agency to reduc e those risks. The training 257 |
---|
391 | 391 | | may be provided in collaboration with the Cybercrime Office of 258 |
---|
392 | 392 | | the Department of Law Enforcement, a private sector entity, or 259 |
---|
393 | 393 | | an institution of the State University System. 260 |
---|
394 | 394 | | (j) Develop a process for detecting, reporting, and 261 |
---|
395 | 395 | | responding to threats, breaches, or cybersecurity incidents 262 |
---|
396 | 396 | | which is consistent with the security rules, guidelines, and 263 |
---|
397 | 397 | | processes established by the department through the Florida 264 |
---|
398 | 398 | | Digital Service. 265 |
---|
399 | 399 | | 1. All cybersecurity incidents and ransomware incidents 266 |
---|
400 | 400 | | breaches must be reported by state agencies. Such reports to the 267 |
---|
401 | 401 | | Florida Digital Service within the department and the Cybercrime 268 |
---|
402 | 402 | | Office of the Department of Law Enforcement and must comply with 269 |
---|
403 | 403 | | the notification procedures and reporting timeframes establis hed 270 |
---|
404 | 404 | | pursuant to paragraph (3)(c). 271 |
---|
405 | 405 | | 2. For cybersecurity breaches, state agencies shall 272 |
---|
406 | 406 | | provide notice in accordance with s. 501.171. 273 |
---|
407 | 407 | | (k) Submit to the Florida Digital Service, within 1 week 274 |
---|
408 | 408 | | after the remediation of a cybersecurity incident or ransomware 275 |
---|
416 | 416 | | Page 12 of 20 |
---|
417 | 417 | | F L O R I D A H O U S E O F R E P R E S E N T A T I V E S |
---|
418 | 418 | | |
---|
419 | 419 | | |
---|
420 | 420 | | |
---|
421 | 421 | | incident, an after-action report that summarizes the incident, 276 |
---|
422 | 422 | | the incident's resolution, and any insights gained as a result 277 |
---|
423 | 423 | | of the incident. 278 |
---|
424 | 424 | | Section 3. Section 282.3185, Florida Statutes, is created 279 |
---|
425 | 425 | | to read: 280 |
---|
426 | 426 | | 282.3185 Local government cybersecurity .— 281 |
---|
427 | 427 | | (1) SHORT TITLE.—This section may be cited as the "Local 282 |
---|
428 | 428 | | Government Cybersecurity Act." 283 |
---|
429 | 429 | | (2) DEFINITION.—As used in this section, the term "local 284 |
---|
430 | 430 | | government" means any county or municipality. 285 |
---|
431 | 431 | | (3) CYBERSECURITY TRAINING. — 286 |
---|
432 | 432 | | (a) The Florida Digital Service shall: 287 |
---|
433 | 433 | | 1. Develop a basic cybersecurity training curriculum for 288 |
---|
434 | 434 | | local government employees. All local government employees with 289 |
---|
435 | 435 | | access to the local government's network must complete the basic 290 |
---|
436 | 436 | | cybersecurity training within 30 days after commencin g 291 |
---|
437 | 437 | | employment and annually thereafter. 292 |
---|
438 | 438 | | 2. Develop an advanced cybersecurity training curriculum 293 |
---|
439 | 439 | | for local governments which is consistent with the cybersecurity 294 |
---|
440 | 440 | | training required under s. 282.318(3)(g). All local government 295 |
---|
441 | 441 | | technology professionals and em ployees with access to highly 296 |
---|
442 | 442 | | sensitive information must complete the advanced cybersecurity 297 |
---|
443 | 443 | | training within 30 days after commencing employment and annually 298 |
---|
444 | 444 | | thereafter. 299 |
---|
445 | 445 | | (b) The Florida Digital Service may provide the 300 |
---|
453 | 453 | | Page 13 of 20 |
---|
454 | 454 | | F L O R I D A H O U S E O F R E P R E S E N T A T I V E S |
---|
455 | 455 | | |
---|
456 | 456 | | |
---|
457 | 457 | | |
---|
458 | 458 | | cybersecurity training required by t his subsection in 301 |
---|
459 | 459 | | collaboration with the Cybercrime Office of the Department of 302 |
---|
460 | 460 | | Law Enforcement, a private sector entity, or an institution of 303 |
---|
461 | 461 | | the State University System. 304 |
---|
462 | 462 | | (4) CYBERSECURITY STANDARDS. — 305 |
---|
463 | 463 | | (a) Each local government shall adopt cybersecurit y 306 |
---|
464 | 464 | | standards that safeguard its data, information technology, and 307 |
---|
465 | 465 | | information technology resources to ensure availability, 308 |
---|
466 | 466 | | confidentiality, and integrity. The cybersecurity standards must 309 |
---|
467 | 467 | | be consistent with generally accepted best practices for 310 |
---|
468 | 468 | | cybersecurity, including the National Institute of Standards and 311 |
---|
469 | 469 | | Technology Cybersecurity Framework. 312 |
---|
470 | 470 | | (b) Each county with a population of 75,000 or more must 313 |
---|
471 | 471 | | adopt the cybersecurity standards required by this subsection by 314 |
---|
472 | 472 | | January 1, 2024. Each county with a populat ion of less than 315 |
---|
473 | 473 | | 75,000 must adopt the cybersecurity standards required by this 316 |
---|
474 | 474 | | subsection by January 1, 2025. 317 |
---|
475 | 475 | | (c) Each municipality with a population of 25,000 or more 318 |
---|
476 | 476 | | must adopt the cybersecurity standards required by this 319 |
---|
477 | 477 | | subsection by January 1, 2024 . Each municipality with a 320 |
---|
478 | 478 | | population of less than 25,000 must adopt the cybersecurity 321 |
---|
479 | 479 | | standards required by this subsection by January 1, 2025. 322 |
---|
480 | 480 | | (d) Each local government shall notify the Florida Digital 323 |
---|
481 | 481 | | Service of its compliance with this subsection as soon as 324 |
---|
482 | 482 | | possible. 325 |
---|
490 | 490 | | Page 14 of 20 |
---|
491 | 491 | | F L O R I D A H O U S E O F R E P R E S E N T A T I V E S |
---|
492 | 492 | | |
---|
493 | 493 | | |
---|
494 | 494 | | |
---|
495 | 495 | | (5) INCIDENT NOTIFICATION. — 326 |
---|
496 | 496 | | (a) A local government shall provide notification of a 327 |
---|
497 | 497 | | cybersecurity incident or ransomware incident to the 328 |
---|
498 | 498 | | Cybersecurity Operations Center, Cybercrime Office of the 329 |
---|
499 | 499 | | Department of Law Enforcement, and sheri ff who has jurisdiction 330 |
---|
500 | 500 | | over the local government in accordance with paragraph (b). The 331 |
---|
501 | 501 | | notification must include, at a minimum, the following 332 |
---|
502 | 502 | | information: 333 |
---|
503 | 503 | | 1. A summary of the facts surrounding the cybersecurity 334 |
---|
504 | 504 | | incident or ransomware incident. 335 |
---|
505 | 505 | | 2. The date on which the local government most recently 336 |
---|
506 | 506 | | backed up its data, the physical location of the backup, if the 337 |
---|
507 | 507 | | backup was affected, and if the backup was created using cloud 338 |
---|
508 | 508 | | computing. 339 |
---|
509 | 509 | | 3. The types of data compromised by the cybersecurity 340 |
---|
510 | 510 | | incident or ransomware incident. 341 |
---|
511 | 511 | | 4. The estimated fiscal impact of the cybersecurity 342 |
---|
512 | 512 | | incident or ransomware incident. 343 |
---|
513 | 513 | | 5. In the case of a ransomware incident, the details of 344 |
---|
514 | 514 | | the ransom demanded. 345 |
---|
515 | 515 | | 6. A statement requesting or declining assistance from the 346 |
---|
516 | 516 | | Cybersecurity Operations Center, the Cybercrime Office of the 347 |
---|
517 | 517 | | Department of Law Enforcement, or the sheriff who has 348 |
---|
518 | 518 | | jurisdiction over the local government. 349 |
---|
519 | 519 | | (b)1. A local government shall report all ransomware 350 |
---|
527 | 527 | | Page 15 of 20 |
---|
528 | 528 | | F L O R I D A H O U S E O F R E P R E S E N T A T I V E S |
---|
529 | 529 | | |
---|
530 | 530 | | |
---|
531 | 531 | | |
---|
532 | 532 | | incidents and any cybersecurity incident determined by the local 351 |
---|
533 | 533 | | government to be of severity level 3, 4, or 5 as provided in s. 352 |
---|
534 | 534 | | 282.318(3)(c) to the Cybersecurity Operations Center, the 353 |
---|
535 | 535 | | Cybercrime Office of the Department of Law Enforcement, and the 354 |
---|
536 | 536 | | sheriff who has jurisdiction over the local government as s oon 355 |
---|
537 | 537 | | as possible but no later than 48 hours after discovery of the 356 |
---|
538 | 538 | | cybersecurity incident and no later than 12 hours after 357 |
---|
539 | 539 | | discovery of the ransomware incident. The report must contain 358 |
---|
540 | 540 | | the information required in paragraph (a). 359 |
---|
541 | 541 | | 2. The Cybersecurity Operat ions Center shall notify the 360 |
---|
542 | 542 | | President of the Senate and the Speaker of the House of 361 |
---|
543 | 543 | | Representatives of any severity level 3, 4, or 5 incident as 362 |
---|
544 | 544 | | soon as possible but no later than 12 hours after receiving a 363 |
---|
545 | 545 | | local government's incident report. The notifica tion must 364 |
---|
546 | 546 | | include a high-level description of the incident and the likely 365 |
---|
547 | 547 | | effects. 366 |
---|
548 | 548 | | (c) A local government may report a cybersecurity incident 367 |
---|
549 | 549 | | determined by the local government to be of severity level 1 or 368 |
---|
550 | 550 | | 2 as provided in s. 282.318(3)(c) to the Cyberse curity 369 |
---|
551 | 551 | | Operations Center, the Cybercrime Office of the Department of 370 |
---|
552 | 552 | | Law Enforcement, and the sheriff who has jurisdiction over the 371 |
---|
553 | 553 | | local government. The report shall contain the information 372 |
---|
554 | 554 | | required in paragraph (a). 373 |
---|
555 | 555 | | (d) The Cybersecurity Operations Center shall provide a 374 |
---|
556 | 556 | | consolidated incident report on a quarterly basis to the 375 |
---|
564 | 564 | | Page 16 of 20 |
---|
565 | 565 | | F L O R I D A H O U S E O F R E P R E S E N T A T I V E S |
---|
566 | 566 | | |
---|
567 | 567 | | |
---|
568 | 568 | | |
---|
569 | 569 | | President of the Senate, the Speaker of the House of 376 |
---|
570 | 570 | | Representatives, and the Florida Cybersecurity Advisory Council. 377 |
---|
571 | 571 | | The report provided to t he Florida Cybersecurity Advisory 378 |
---|
572 | 572 | | Council may not contain the name of any local government, 379 |
---|
573 | 573 | | network information, or system identifying information but must 380 |
---|
574 | 574 | | contain sufficient relevant information to allow the Florida 381 |
---|
575 | 575 | | Cybersecurity Advisory Council to fulfi ll its responsibilities 382 |
---|
576 | 576 | | as required in s. 282.319(9). 383 |
---|
577 | 577 | | (6) AFTER-ACTION REPORT.—A local government must submit to 384 |
---|
578 | 578 | | the Florida Digital Service, within 1 week after the remediation 385 |
---|
579 | 579 | | of a cybersecurity incident or ransomware incident, an after -386 |
---|
580 | 580 | | action report that summarizes the incident, the incident's 387 |
---|
581 | 581 | | resolution, and any insights gained as a result of the incident. 388 |
---|
582 | 582 | | By December 1, 2022, the Florida Digital Service shall establish 389 |
---|
583 | 583 | | guidelines and processes for submitting an after -action report. 390 |
---|
584 | 584 | | Section 4. Section 282.3186, Florida Statutes, is created 391 |
---|
585 | 585 | | to read: 392 |
---|
586 | 586 | | 282.3186 Ransomware incident compliance. —A state agency as 393 |
---|
587 | 587 | | defined in s. 282.318(2), a county, or a municipality 394 |
---|
588 | 588 | | experiencing a ransomware incident may not pay or otherwise 395 |
---|
589 | 589 | | comply with a ransom demand. 396 |
---|
590 | 590 | | Section 5. Subsections (2) of section 282.319, Florida 397 |
---|
591 | 591 | | Statutes, is amended, paragraphs (g) and (h) are added to 398 |
---|
592 | 592 | | subsection (9), and subsections (12) and (13) are added to that 399 |
---|
593 | 593 | | section, to read: 400 |
---|
601 | 601 | | Page 17 of 20 |
---|
602 | 602 | | F L O R I D A H O U S E O F R E P R E S E N T A T I V E S |
---|
603 | 603 | | |
---|
604 | 604 | | |
---|
605 | 605 | | |
---|
606 | 606 | | 282.319 Florida Cybersecurity Advisory Council. — 401 |
---|
607 | 607 | | (2) The purpose of the council is to : 402 |
---|
608 | 608 | | (a) Assist state agencies in protecting their information 403 |
---|
609 | 609 | | technology resources from cybersecurity cyber threats and 404 |
---|
610 | 610 | | incidents. 405 |
---|
611 | 611 | | (b) Advise counties and municipalities on cybersecurity, 406 |
---|
612 | 612 | | including cybersecurity threats, trends, and best practices. 407 |
---|
613 | 613 | | (9) The council shall meet at least quarterly to: 408 |
---|
614 | 614 | | (g) Review information relating to cybersecurity incidents 409 |
---|
615 | 615 | | and ransomware incidents to determine commonalities and develop 410 |
---|
616 | 616 | | best practice recommendations for state agencies, c ounties, and 411 |
---|
617 | 617 | | municipalities. 412 |
---|
618 | 618 | | (h) Recommend any additional information that a county or 413 |
---|
619 | 619 | | municipality should report to the Florida Digital Service as 414 |
---|
620 | 620 | | part of its cybersecurity incident or ransomware incident 415 |
---|
621 | 621 | | notification pursuant to s. 282.3185. 416 |
---|
622 | 622 | | (12) Beginning December 1, 2022, and each December 1 417 |
---|
623 | 623 | | thereafter, the council shall submit to the Governor, the 418 |
---|
624 | 624 | | President of the Senate, and the Speaker of the House of 419 |
---|
625 | 625 | | Representatives a comprehensive report that includes data, 420 |
---|
626 | 626 | | trends, analysis, findings, and recom mendations for state and 421 |
---|
627 | 627 | | local action regarding ransomware incidents. At a minimum, the 422 |
---|
628 | 628 | | report must include: 423 |
---|
629 | 629 | | (a) Descriptive statistics including the amount of ransom 424 |
---|
630 | 630 | | requested, duration of the ransomware incident, and overall 425 |
---|
638 | 638 | | Page 18 of 20 |
---|
639 | 639 | | F L O R I D A H O U S E O F R E P R E S E N T A T I V E S |
---|
640 | 640 | | |
---|
641 | 641 | | |
---|
642 | 642 | | |
---|
643 | 643 | | monetary cost to taxpayers of the ransomware incident. 426 |
---|
644 | 644 | | (b) A detailed statistical analysis of the circumstances 427 |
---|
645 | 645 | | that led to the ransomware incident which does not include the 428 |
---|
646 | 646 | | name of the state agency, county, or municipality; network 429 |
---|
647 | 647 | | information; or system identifying information. 430 |
---|
648 | 648 | | (c) A detailed statistical analysis of the level of 431 |
---|
649 | 649 | | cybersecurity employee training and frequency of data backup for 432 |
---|
650 | 650 | | the state agency, county, or municipality that reported the 433 |
---|
651 | 651 | | ransomware incident. 434 |
---|
652 | 652 | | (d) Specific issues identified with current policies, 435 |
---|
653 | 653 | | procedures, rules, or statutes and recommendations to address 436 |
---|
654 | 654 | | such issues. 437 |
---|
655 | 655 | | (e) Any other recommendations to prevent ransomware 438 |
---|
656 | 656 | | incidents. 439 |
---|
657 | 657 | | (13) For purposes of this section, the term "state agency" 440 |
---|
658 | 658 | | has the same meaning as provided in s. 282.318(2). 441 |
---|
659 | 659 | | Section 6. Section 815.062, Florida Statutes, is created 442 |
---|
660 | 660 | | to read: 443 |
---|
661 | 661 | | 815.062 Offenses against governmental entities. — 444 |
---|
662 | 662 | | (1) As used in this section, the term "governmental 445 |
---|
663 | 663 | | entity" means any official, officer, commission, board, 446 |
---|
664 | 664 | | authority, council, committe e, or department of the executive, 447 |
---|
665 | 665 | | judicial, or legislative branch of state government; any state 448 |
---|
666 | 666 | | university; or any county or municipality, special district, 449 |
---|
667 | 667 | | water management district, or other political subdivision of the 450 |
---|
675 | 675 | | Page 19 of 20 |
---|
676 | 676 | | F L O R I D A H O U S E O F R E P R E S E N T A T I V E S |
---|
677 | 677 | | |
---|
678 | 678 | | |
---|
679 | 679 | | |
---|
680 | 680 | | state. 451 |
---|
681 | 681 | | (2) A person who willfu lly, knowingly, and without 452 |
---|
682 | 682 | | authorization introduces a computer contaminant that gains 453 |
---|
683 | 683 | | unauthorized access to, encrypts, modifies, or otherwise renders 454 |
---|
684 | 684 | | unavailable data, programs, or supporting documentation residing 455 |
---|
685 | 685 | | or existing within a computer, computer system, computer 456 |
---|
686 | 686 | | network, or electronic device owned or operated by a 457 |
---|
687 | 687 | | governmental entity and demands a ransom to prevent the 458 |
---|
688 | 688 | | publication of or restore access to the data, programs, or 459 |
---|
689 | 689 | | supporting documentation or to otherwise remediate the impact of 460 |
---|
690 | 690 | | the computer contaminant commits a felony of the first degree, 461 |
---|
691 | 691 | | punishable as provided in s. 775.082, s. 775.083, or s. 775.084. 462 |
---|
692 | 692 | | (3) An employee or contractor of a governmental entity 463 |
---|
693 | 693 | | with access to the governmental entity's network who willfully 464 |
---|
694 | 694 | | and knowingly aids or abets another in the commission of a 465 |
---|
695 | 695 | | violation of subsection (2) commits a felony of the first 466 |
---|
696 | 696 | | degree, punishable as provided in s. 775.082, s. 775.083, or s. 467 |
---|
697 | 697 | | 775.084. 468 |
---|
698 | 698 | | (4) In addition to any other penalty imposed, a person 469 |
---|
699 | 699 | | convicted of a violati on of this section must pay a fine equal 470 |
---|
700 | 700 | | to twice the amount of the ransom demand. Moneys recovered under 471 |
---|
701 | 701 | | this subsection shall be deposited into the General Revenue 472 |
---|
702 | 702 | | Fund. 473 |
---|
703 | 703 | | Section 7. The Legislature finds and declares that this 474 |
---|
704 | 704 | | act fulfills an important state interest. 475 |
---|