Florida 2022 2022 Regular Session

Florida Senate Bill S0828 Analysis / Analysis

Filed 02/01/2022

                    The Florida Senate 
BILL ANALYSIS AND FISCAL IMPACT STATEMENT 
(This document is based on the provisions contained in the legislation as of the latest date listed below.) 
Prepared By: The Professional Staff of the Committee on Governmental Oversight and Accountability  
 
BILL: SB 828 
INTRODUCER:  Senator Hutson 
SUBJECT:  Critical Infrastructure 
DATE: February 1, 2022 
 
 ANALYST STAFF DIRECTOR  REFERENCE  	ACTION 
1. Ponder McVaney GO Pre-meeting 
2.     MS  
3.     RC  
 
I. Summary: 
SB 828 creates the Critical Infrastructure Standards and Procedures Act.  
 
The bill sets forth a legislative finding that a standard definition of the security capabilities for 
system components will provide a common language for product suppliers and all other control 
system stakeholders, simplifying the procurement and integration processes for the computers, 
applications, network equipment, and control devices that make up a control system. As part of 
the legislative finding, the bill notes the importance of cybersecurity standards and instructs that 
the internationally recognized ISA/IEC 62443 standards (IEC 62443)
1
 define a set of measures 
and benchmarks that guide organizations through the process of assessing the risk associated 
with a particular automation and control system and in identifying and applying security 
countermeasures to reduce that risk.  
 
The bill requires an asset owner,
2
 beginning July 1, 2024, to ensure that the operation and 
maintenance of operational technology, including critical infrastructure, automation control 
systems, and automation control system components, are compliant with the standards and 
practices within IEC 62443, including annual risk assessments and creation of a mitigation plan.  
 
The bill requires specified procurements to conform to the IEC 62443 beginning July 1, 2026. 
Specifically, when procuring automation and control system components, services, or solutions, 
or when contracting for facility upgrades or the construction of critical infrastructure facilities, an 
asset owner must require that such items conform to the IEC 62443. Additionally, contracts 
                                                
1
 The ISA/IEC 62443 standards are one among many informational materials related to cybersecurity referenced by the NIST 
Cybersecurity Framework, which is a set of guidelines for mitigating organizational cybersecurity risks published by the 
United States National Institute of Standards and Technology.   
2
 The bill defines the term “asset owner” to mean the public or private owner of, or the entity accountable and responsible for 
operation of, the critical infrastructure and the automation and control system. The asset owner is also the operator of the 
automation and control system components and the equipment under its control.  
REVISED:   BILL: SB 828   	Page 2 
 
awarded for specified activities
3
 must require that installed automation and control components 
meet the minimum standards for cybersecurity as defined by the IEC 62443. 
 
The bill provides for specified procedures, determinations, a condition of immunity, and 
remedies for any civil action based on a cybersecurity-breach related claim, including a civil 
action brought by the Department of Law Enforcement (department) under the bill.  
 
The bill authorizes the department to institute an appropriate legal proceeding, including a civil 
action, against a party if it has reason to believe that the party - a business, service provider, or 
other person or entity - is in violation of the compliance requirements set forth in the bill and that 
proceedings would be in the public interest. The bill gives the department discretion to grant a 
party a 30-day cure period and issue a letter of guidance under a specified procedure. The 
department is permitted to bring a legal proceeding against the business for the alleged violation.  
 
The bill grants the department rule-making authority in consultation with the Florida Digital 
Service and the Florida Cybersecurity Advisory Council. 
 
The bill takes effect on July 1, 2022. 
II. Present Situation: 
Cybersecurity and Critical Infrastructure  
 
The United States depends on the reliable function of critical infrastructure. Cybersecurity 
threats exploit the increased complexity and connectivity of critical infrastructure systems, 
placing the Nation’s security, economy, and public safety and health at risk.
4
 
 
“Critical infrastructure” is defined in the U.S. Patriot Act of 2001 to mean “systems and assets, 
whether physical or virtual, so vital to the United States that the incapacity or destruction of such 
systems and assets would have a debilitating impact on security, national economic security, 
national public health or safety, or any combination of those matters.”
5
 The critical infrastructure 
community includes public and private owners and operators, and other entities with a role in 
securing the Nation’s infrastructure.  
 
The Cybersecurity Enhancement Act of 2014 and the National Institute of Standards and 
Technology 
The Cybersecurity Enhancement Act of 2014 grants the National Institute of Standards and 
Technology (NIST) power to guide the development of a “voluntary, industry-led set of 
standards . . . to cost-effectively reduce cyber risks to critical infrastructure.”
6
 NIST implements 
                                                
3
 Contracts awarded for construction, reconstruction, alteration, design, or commissioning of facilities identified as critical 
infrastructure.  
4
 Framework for Improving Critical Infrastructure Cybersecurity, (NIST Framework), National Institute of Standards and 
Technology, April 16, 2018, https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf.  
5
 42 U.S.C. § 5195c(e). 
6
 See 15 U.S.C. § 272(e)(1)(A)(i). The Cybersecurity Enhancement Act of 2014 (S.1353) became public law 113- 274 on 
December 18, 2014, and may be found at: https: //www.congress.gov/bill/113th-congress/senatebill/1353/text.  BILL: SB 828   	Page 3 
 
the Cybersecurity Act through its NIST Framework,
7
 which provides a common organizing 
structure for multiple approaches to cybersecurity by assembling standards, guidelines and 
practices that are currently working effectively in the industry.
8
  
 
The NIST Framework offers a flexible way to address cybersecurity, including cybersecurity’s 
effect on physical, cyber, and people dimensions. It is applicable to organizations relying on 
technology, whether their cybersecurity focus is primarily on information technology, industrial 
control systems, cyber-physical systems, or connected devices more generally.  
 
The NIST Framework provides a common system of classification for organizations to: 
 Describe their current cybersecurity posture; 
 Describe their target state for cybersecurity; 
 Identify and prioritize opportunities for improvement within the context of a continuous and 
repeatable process; 
 Assess progress toward the target state; and 
 Communicate among internal and external stakeholders about cybersecurity risk.  
 
ISA/IEC 62443 Series of Standards 
The NIST Framework references several informative standards relevant to cybersecurity, 
including the ISA/IEC 62443 (IEC 62443) which was jointly developed by the International 
Society of Automation (ISA)
9
 and the International Electrotechnical Commission (IEC).
10
 IEC 
62443 addresses security issues unique to industrial automation and control systems (IACS) 
throughout their lifecycle. IEC 62443 can be applied to any industrial environment, including 
critical infrastructure facilities, such as power utilities or nuclear plants, as well as in the health 
and transport sectors. Thus, the standards illustrate methods to manage distinctive challenges 
related to the IACS environments, including: (i) the relative criticality of data confidentiality in 
facilities operations or functions; (ii) potential dangers to personnel, the environment, and society 
in the event of cyber-physical failures; (iii) the relative difficulty of applying common 
information technology security techniques without severe systems modifications; and (iv) 
unique approaches to ensuring systems reliability and integrity in industrial environments. 
 
The IEC 62443 is a family of documents structured into a multi-tier grouping of four parts: 
General (IEC 62443-1); Policies and procedures (IEC 62443-2); System (IEC 62443-3); and 
Component (IEC 62443-4).
11
  
 
                                                
7
 Version 1.0 of the NIST Framework was released in 2014, in response to EO 13,636 “Improving Critical Infrastructure 
Cybersecurity,” issued on February 12, 2013. It was subsequently replaced with version 1.1 in 2018. 
8
 NIST Framework, supra note 4.  
9
 The International Society of Automation (ISA) is a professional association founded in 1945 to create a better world 
through automation.  
10
 The Electrotechnical Commission (IEC) is a global membership organization. IEC International Standards reflect the 
global consensus and distilled wisdom of many thousand technical experts who are delegated by their countries to participate 
in the IEC. The participating experts are organized into technical committees and subcommittees (TC/SC). Each TC defines 
its scope and area of activity. IEC 62443 was a project of the TC 65, Industrial-process measurement, control and automation 
11
 Ron Brash, The Ultimate Guide to Protecting OT Systems with IEC 62443 (June 23, 2021), 
https://verveindustrial.com/resources/blog/the-ultimate-guide-to-protecting-ot-systems-with-iec-62443/.   BILL: SB 828   	Page 4 
 
Figure 1: IEC 62443 Standards Overview
12
 
IEC 62443-1 defines the elements necessary to establish a cybersecurity management system for 
industrial automation and control systems (IACS) and provides guidance on how to develop 
those elements. It defines IACS as a “collection of processes, personnel, hardware, and software 
that can affect or influence the safe, secure, and reliable operation of an industrial process.” IEC 
62443-1 also lists the seven foundational requirements: 
 Identification and authentication control; 
 Use control; 
 System integrity; 
 Data confidentiality; 
 Restricted data flow; 
 Timely response to events; and 
 Resource availability. 
 
IEC 62443-2, policy and procedures, defines the elements necessary to establish a cybersecurity 
management system for IACS and provides guidance on how to develop those elements. 
Specifies a comprehensive set of requirements covering IACS service providers that can be used 
during integration and maintenance activities.  IEC 62443-2-4, provides the basis for a larger 
                                                
12
 Figure 1 illustrates the relationship of the different parts of the IEC 62443. See International Electrotechnical Commission, 
Security for Industrial Automation and Control Systems – Part 4-1: Secure product development lifecycle requirements 
https://webstore.iec.ch/preview/info_iec62443-4-1%7Bed1.0%7Db.pdf.   BILL: SB 828   	Page 5 
 
IEC 62443 initiative to develop “profiles” that address the nuances and realities in different 
industrial environments, for example, the unique requirements of oil and gas producers versus 
those of electricity generation and distribution. 
 
IEC 62443-3 sets forth the requirements at the system level, including:  
 Defining a system under consideration for an IACS; 
 Partitioning the system under consideration into zones and conduits; 
 Assessing risk for each zone and conduit; 
 Establishing the target security level for each zone and conduit; and 
 Documenting the security requirements.  
 
IEC 62443-3-3 provides detailed technical control system requirements associated with the seven 
foundational requirements provided in IEC 62442-1 including defining the requirements for 
control system capability security levels. Such requirements would be used by various members 
of the IACS community.  
 
IEC 62443-4 defines a secure development life-cycle for purpose of developing and maintaining 
secure products. This life-cycle description includes security requirements definition, secure 
design, secure implementation (including coding guidelines), verification and validation, defect 
management, patch management and product end-of-life. These requirements can be applied to 
new or existing processes for developing, maintaining and retiring hardware, software or 
firmware. 
 
The IEC 62443, like most standards and frameworks, offers guidance to improve existing 
processes for technology project scoping, vendor selection and procurement. For example, an 
organization that wants to create a machine cell for a new process with a minimum level of 
security to prevent accidental issues can reference the requirements in IEC-62443-3-3 and other 
sibling documents to develop pre-selection criteria and achieve its objective. The standards can 
also be used to dictate how factory and site acceptance testing includes security verification 
before handoff.
13
 
 
Cybersecurity Intrusions 
Oldsmar Water System 
On February 5, 2021, hackers remotely accessed the water treatment plant of the city of Oldsmar 
and changed the levels of lye in the drinking water. At a press conference on February 8, 2021, 
Sheriff Bob Gualtieri of Pinellas County stated that the hacker changed the level of sodium 
hydroxide– also known as lye
14
 (the main ingredient in liquid drain cleaners) – from about 100 
parts per million to 11,100 parts per million, dangerous levels that could have badly sickened 
residents if it had reached their homes.
15
 The intrusion lasted three to five minutes and was 
mitigated before it could reach the drinking supply and inflict harm.  
                                                
13
 Brash, supra note 11.  
14
 Lye is the main ingredient in liquid drain cleaners and also used to control water acidity and remove metals from drinking 
water in water treatment plants.  
15
 Treatment Plant Intrusion Press Conference, February 8, 2021, https://www.youtube.com/watch?v=MkXDSOgLQ6M (last 
visited December 7, 2021).  BILL: SB 828   	Page 6 
 
 
Colonial Pipeline 
On May 7, 2021, Colonial Pipeline, which carries refined gasoline and jet fuel from Texas up the 
East Coast to New York, shut down its system in response to a ransomware cyberattack.
16
 The 
company quickly notified the Federal Bureau of Investigation (FBI) on the day of the attack. The 
FBI attributed the cyberattack to DarkSide, a group believed to be based in Russia or Eastern 
Europe. The pipeline was shut down for approximately six days.   
 
In June 2021, the chief executive of the pipeline company told a Senate committee that it is 
believed that the cybercriminals accessed its computer via an old virtual private network -
commonly known as a V.P.N. - that the company no longer used.
17
 It is believed that the damage 
to the pipeline could have been worse had the company not paid the ransom to DarkSide. 
Investigators were able to trace 75 Bitcoins worth more than $4 million through cryptocurrency 
accounts and recover much of the ransom paid by the company.
18
  
 
Bowman Avenue Dam – Rye Brook N.Y. 
The Bowman Avenue Dam is located in Rye Brook, New York, a village of about 9,500 
residents. The dam’s floodgate is only about 15 feet long and two and half feet high. It was 
primarily built to keep the Blind Brook, a small babbling creek, from flooding homes and 
businesses nearby. Despite its unassuming size, the dam was a target of a cyberattack in 2013. 
Seven Iranian computer hackers chose to penetrate the dam’s computer-guided controls as part 
of a plot that also breached or shut down over forty of the nation’s largest financial institutions.
19
 
The attempt failed because the dam was under repair and offline at the time. However, the 
incident worried American investigators because the attack was aimed at seizing control of a 
piece of infrastructure.  
 
Florida Department of Law Enforcement 
Section 20.201, F.S., creates the Department of Law Enforcement (FDLE). FDLE is a criminal 
justice agency with statewide jurisdiction. FDLE’s mission is to promote public safety and 
strengthen domestic security by providing services in partnership with local, state, and federal 
criminal justice agencies to prevent, investigate, and solve crimes while protecting Florida’s 
citizens and visitors. Through its seven Regional Operations Centers and five Divisions,
20
 FDLE 
delivers investigative, forensic, training and protection/security services to Florida’s criminal 
justice community.  
 
                                                
16
 David E. Sanger, Clifford Krauss and Nicole Perlroth, Cyberattack Forces a Shutdown of a Top U.S. Pipeline, New York 
Times, May 8, 2021, https://www.nytimes.com/2021/05/08/us/politics/cyberattack-colonial-pipeline.html.  
17
 Clifford Krauss, Colonial Pipeline chief says an oversight let hackers into its system, New York Times, June 8, 2021, 
https://www.nytimes.com/2021/06/08/business/colonial-pipeline-hack.html?searchResultPosition=4.  
18
 Katie Benner, Nicole Perloth, U.S. Seizes Share of Ransom From Hackers in Colonial Pipeline Attack.  
19
 Joseph Berger, A Dam, Small and Unsung, Is Caught Up in an Iranian Hacking Case, New York Times, March 25, 2016, 
https://www.nytimes.com/2016/03/26/nyregion/rye-brook-dam-caught-in-computer-hacking-case.html.  
20
 Executive Direction and Business Support, Criminal Investigations and Forensic Science, Criminal Justice Information, 
Criminal Justice Professionalism and Florida Capitol Police.  BILL: SB 828   	Page 7 
 
Civil Immunity 
Florida law provides civil immunity to certain individuals in specified circumstances who, acting 
in good faith, attempt to render aid to others.
21
 Section 937.021, F.S., currently provides civil 
immunity for specified entities requested by law enforcement to record, report, transmit, display, 
or release information pertaining to a missing person if such entity complied with the request in 
good faith.
22
 These entities include: 
 The FDLE, a state or local law enforcement agency, and agency personnel; 
 A radio or television network, broadcaster, or other media representative; or 
 A dealer of communications services as defined in s. 202.11, F.S.
23
 
 
Entities who report, transmit, display, or release information pertaining to a missing person are 
presumed to have acted in good faith.
24
 The presumption of good faith is not overcome if a 
technical or clerical error is made by an agency, employee, individual, or entity acting at the 
request of the local law enforcement agency having jurisdiction or if the missing person 
information is incomplete or incorrect because the information received from the local law 
enforcement agency was incomplete or incorrect.
25
 
 
Negligence  
As developed by the common law, a cause of action for negligence arises where one's “failure to 
use that degree of care which a reasonably careful person would use under like circumstances” 
causes injury.
26
  Common law negligence is open-ended and divorced from intent,
27
“allow[ing] 
the plaintiff to claim that any given conduct was negligent.”
28
  
 
While negligence has its roots in common law, legislative enactments play an important role in 
shaping standards of conduct.
29
 Proof that a defendant violated a statute——can be categorized 
in a negligence case in one of three ways, depending on the statute's purpose: (1) violation of a 
strict liability statute designed to protect a particular class of persons who are unable to protect 
themselves, constituting negligence per se; (2) violation of a statute establishing a duty to take 
precautions to protect a particular class of persons from a particular type of injury, also 
constituting negligence per se; (3) violation of any other kind of statute, constituting mere prima 
facie evidence of negligence. 
                                                
21
 For example, Section 768.13, F.S. (also known as Florida’s Good Samaritan Act (GSA)) provides immunity from civil 
liability for persons acting in good faith who render emergency care and treatment to individuals in need of assistance. Under 
the GSA, immunity from civil liability is available to any person who gratuitously and in good faith renders emergency 
assistance without the objection of a victim, if the person acts as a reasonably prudent person would act under similar 
circumstances. 
22
 Section 937.021(5)(a), F.S. 
23
 Examples of a dealer of communications services include a cable or satellite television service provider, a telephone 
service provider, or a mobile communication service provider. s. 937.021, F.S. 
24
 Section 937.021(5)(c), F.S. 
25
 Id. 
26
 London v. Atl. Mut. Ins. Co., 689 So.2d 424, 425 (Fla. 4th DCA 1997). 
27
 Booth v. Mary Carter Paint Co., 182 So.2d 292, 299 (Fla. 2d DCA 1966). 
28
 Dan B. Dobbs, The Law of Torts § 110, at 257 (2000). 
29
 Kohl v. Kohl, 149 So. 3d 127, 131–32 (Fla. 4th DCA 2014) (citing W. Page Keeton et al., Handbook on the Law of Torts § 
35 (3d ed. 1964)).  BILL: SB 828   	Page 8 
 
 
For there to be an “actionable negligence claim against a government entity, there must be a 
common law or statutory duty regarding the alleged negligent conduct.”
30
   
 
Sovereign Immunity 
Sovereign immunity protects the sovereign from being sued without its consent.
31
 . At common 
law, the state possessed immunity from suit as an aspect of its sovereignty. The doctrine of 
sovereign immunity flows from the concept that one could not sue the king in his own courts; 
hence the phrase ‘the king can do no wrong.”’
32
 The doctrine has been adopted and codified by 
the Florida Legislature.
33
 
 
Article X, section 13 of the State Constitution, however, allows the Legislature to abrogate the 
state’s sovereign immunity.
34
 The Legislature, in accordance with this provision, effectuated a 
limited waiver of sovereign immunity in s. 768.28, F.S.  The sovereign immunity statute 
authorizes suits in tort against the State and its agencies and political subdivisions for damages 
resulting from the negligence of government employees acting in the scope of their 
employment.
35
 The waiver applies only to “injury or loss of property, personal injury, or death 
caused by the negligent or wrongful act or omission of any employee of the agency or 
subdivision while acting within the scope of the employee's office or employment ....” 
36
  
 
Section 768.28(5), F.S., provides that the state, its agencies, or subdivisions shall not be liable to 
pay any claim or judgment by any one person which exceeds the sum of $200,000.
37
 If there are 
multiple claims or judgments arising out of the same incident or occurrence, the total amount the 
state, its agencies, or subdivisions may be liable for is $300,000.
38
. 
 
The National Institute of Standards and Technology in Florida Statutes 
Section 531.39, F.S., provides that weights and measures that are traceable to the United States 
prototype standards supplied by the Federal Government, or approved as being satisfactory by 
the National Institute of Standards and Technology (NIST), shall be the state primary standards 
of weights and measures, and shall be maintained in such calibration as prescribed by 
the National Institute of Standards and Technology.  The Department of Agriculture and 
Consumer Services is required to regulations regarding technical requirements for commercial 
weighing and measuring devices, that conform to those adopted by the NIST to the extent 
possible.
39
   
                                                
30
 Moore v. Dep't of Corr., 833 So. 2d 822, 824 (Fla. 4th DCA 2002) (citing Hinckley v. Palm Beach County Bd. of 
Comm'rs, 801 So. 2d 193, 194-95 (Fla. 4th DCA 2001)). 
31
 Town of Gulf Stream v. Palm Beach Cty., 206 So. 3d 721, 725 (Fla. 4th DCA 2016); City of Fort Lauderdale v. Israel, 178 
So.3d 444, 446 (Fla. 4th DCA 2015) 
32
  Cauley v. City of Jacksonville, 403 So.2d 379, 381 (Fla. 1981). 
33
 See generally s. 2.01, F.S. 
34
 Article X, Section 13, Fla. Const.  
35
 Section 768.28, F.S. 
36
 Section 768.28(1), F.S. 
37
 Section 768.28(5), F.S. 
38
 Id.  
39
 Section 531.40, F.S.  BILL: SB 828   	Page 9 
 
 
The Department of Management Services (DMS), acting through the Florida Digital Service, is 
the lead entity responsible for establishing standards and processes for assessing state agency 
cybersecurity risks and determining appropriate security measures.
40
 These standards and 
processes are required to be consistent with generally accepted technology best practices, 
including the NIST Cybersecurity Framework for cybersecurity.
41
 Additionally, the DMS, acting 
through the Florida Digital Service, must establish procedures for procuring information 
technology commodities and services that require the commodity or service to meet the NIST 
Cybersecurity Framework.
42
  
III. Effect of Proposed Changes: 
The bill includes a series of whereas clauses that provide background information on the 
importance of maintaining the security of operational technologies that operate critical 
infrastructure and how such critical infrastructure is at risk of experiencing cybersecurity 
intrusion.  
 
Section 1 provides the act may be cited as the “Critical Infrastructure Standards and Procedures 
Act.” 
 
Section 2 creates s. 943.6873, F.S., to set forth the legislative finding that a standard definition of 
the security capabilities for system components will provide a common language for product 
suppliers and all other control system stakeholders, simplifying the procurement and integration 
processes for the computers, applications, network equipment, and control devices that make up 
a control system. This section explains that the United States National Institute of Standards and 
Technology (NIST) published the NIST Cybersecurity Framework, which references several 
relevant cybersecurity standards, including the internationally recognized ISA/IEC 62443 series 
of standards (IEC 62443). These standards define a set of measures and benchmarks specifically 
built to guide organizations through the process of assessing the risk associated with a particular 
automation and control system and in identifying and applying security countermeasures to 
reduce that risk.  
 
This section defines the following terms:  
 Asset owner; 
 Automation and control system; 
 Automation and control system component; 
 Critical infrastructure; 
 Cybersecurity-breach-related claim; 
 Department; and 
 Operation technology. 
 
“Asset owner” is defined to mean the public or private owner of, or the entity accountable and 
responsible for operation of, the critical infrastructure and the automation and control system. 
                                                
40
 Section 282.318(3), F.S. 
41
 Id. 
42
 Section 282.318(3)(c)13, F.S.  BILL: SB 828   	Page 10 
 
The asset owner is also the operator of the automation and control system components and the 
equipment under its control.  
 
“Automation and control system” means a collection of personnel, hardware, software, and 
policies associated with the operation of the critical infrastructure which can affect or influence 
its safe, secure, and reliable operation.  
 
“Automation and control system component” means control systems and any complementary 
hardware and software components installed and configured to operate in an automation and 
control system. These systems include, but are not limited to:  
 Control systems, including distributed control systems, programmable logic controllers, 
remote terminal units, intelligent electronic devices, supervisory control and data acquisition, 
networked electronic sensing and control, monitoring and diagnostic systems, and process 
control systems that include physically separate or integrated basic process control system 
and safety-instrumented system functions;  
 Associated information systems, such as advanced or multivariable control, online 
optimizers, dedicated equipment monitors, graphical interfaces, process historians, 
manufacturing execution systems, and plant information management systems; and 
 Associated internal, human, network used to provide control, safety, and manufacturing 
operations functionality to continuous, batch, discrete, and other processes as defined by the 
International Society of Automation IEC 62443.  
 
“Critical infrastructure” means all physical and virtual assets, systems, and networks considered 
vital and vulnerable to cybersecurity attacks, as determined by the department in consultation 
with the Florida Digital Service and the Florida Cybersecurity Advisory Council. Critical 
infrastructure includes, but is not limited to: 
 Public transportation as defined in s. 163.566;  
 Water and wastewater treatment facilities, public utilities, and public services subject to the 
jurisdiction, supervision, powers, and duties of the Florida Public Service Commission; 
 Public buildings, including those operated by the State University System;  
 Hospitals and public health facilities; and  
 Financial services organizations regulated by the Department of Financial Services.  
 
“Cybersecurity-breach-related claim” means a legal proceeding or civil action against an asset 
owner for failure to meet the minimum standards required by this section.  
 
“Department” means the Department of Law Enforcement. 
 
“Operation technology” means the hardware and software that detects or causes a change 
through the direct monitoring or control of physical devices and systems, processes, and events 
in the critical infrastructure. 
 
Section 2 requires the asset owner, beginning on July 1, 2024, to ensure that the operation and 
maintenance of operational technology, including critical infrastructure, automation control 
systems, and automation control system components, are compliant with the standards and  BILL: SB 828   	Page 11 
 
practices defined in IEC 62443, including annual risk assessments and creation of a mitigation 
plan. (July 2024 General Requirements)  
 
Beginning on July 1, 2026, when procuring automation and control system components, services, 
or solutions, or when contracting for facility upgrades or the construction of critical 
infrastructure facilities, an asset owner must require that such items conform to the IEC 62443. 
(July 2026 Procurement Requirements) All contracts awarded for construction, reconstruction, 
alteration, design, or commissioning of facilities identified as critical infrastructure must require 
that installed automation and control components meet the minimum standards for cybersecurity 
as defined by the IEC 62443. 
 
Section 2 also provides that in any civil action based on a cybersecurity-breach related claim, 
including a civil action brought by the Department of Law Enforcement (department)
43
 under the 
bill:  
 A court shall determine as a matter of law whether the defendant made a good faith effort to 
comply with July 2024 General Requirements or the July 2026 Procurement Requirements, 
as applicable.  
 The defendant is immune from civil liability upon determination by the court of a good faith 
effort by defendant.  
 The plaintiff may proceed with the action if the court determines that the defendant did not 
make such a good faith effort.  
 The trial court, upon a showing that any business, service provider, or other person or entity 
is in violation of this section, may take any of the following actions:  
o Issue a temporary or permanent injunction.  
o Impose a civil penalty of not more than $2,500 for each unintentional violation or $7,500 
for each intentional violation.  
o Award reasonable costs of enforcement, including reasonable attorney fees and costs.  
o Grant any other relief as the court deems appropriate.  
 
Section 2 authorizes the department to institute an appropriate legal proceeding, including a civil 
action, against a party if it has reason to believe that that party - a business, service provider, or 
other person or entity - is in violation of the compliance requirements set forth in the bill and that 
proceedings would be in the public interest. Upon providing written notice, the department may 
allow a party a 30-day period to cure the alleged violation. Under the bill, the department may 
consider the number of violations, the substantial likelihood of injury to the public, or the safety 
of persons or property in determining whether to grant the 30-day period to cure an alleged 
violation. 
 
This section allows the department discretion to issue a letter of guidance if the party
44
 cures the 
alleged violation. Specifically, if the alleged violation is cured to the department’s satisfaction 
and the party provides proof of such cure, the department may issue a letter of guidance to the 
party providing notice that a 30-day cure period for any future violation will not be offered. 
                                                
43
 The Department of Law Enforcement is a criminal justice agency and is currently not charged with bringing forth civil 
suits in any capacity.   
44
 The business, service provider, or other person or entity.  BILL: SB 828   	Page 12 
 
Should the party fail to cure the violation within 30 days, the department may bring a legal 
proceeding against the business for the alleged violation.  
 
This section grants the department with rule making authority in consultation with the Florida 
Digital Service and the Florida Cybersecurity Advisory Council. 
 
Section 3 provides that the bill takes effect July 1, 2022.  
IV. Constitutional Issues: 
A. Municipality/County Mandates Restrictions: 
Article VII, s. 18(a) of the State Constitution provides, in relevant part, that: “No county 
or municipality shall be bound by any general law requiring such county or municipality 
to spend funds. . .unless the legislature has determined that such law fulfills an important 
state interest and unless: the law requiring such expenditure is approved by two-thirds 
vote of the membership of each house of the legislature; [or] . . . the expenditure is 
required to comply with a law that applies to all persons similarly situated, including the 
state and local governments. . ..” 
 
If counties and municipalities complying with the bill’s requirements related to the 
IEC 62443 is deemed to be “requiring” an expenditure under the mandates provision, the 
legislature may want to consider adding a legislative finding that the bill fulfills an 
important state interest to ensure such requirements are binding upon counties and 
municipalities. As drafted, the bill seems to apply to all persons similarly situated 
(governmental entities responsible for operation of critical infrastructure) including state 
agencies, universities, counties, and municipalities. 
B. Public Records/Open Meetings Issues: 
None. 
C. Trust Funds Restrictions: 
None. 
D. State Tax or Fee Increases: 
None. 
E. Other Constitutional Issues: 
Article I, section 21, of the State Constitution, part of the constitutional “Declaration of 
Rights” states that “:[t]he courts shall be open to every person for redress of any injury, 
and justice shall be administered without sale, denial or delay.”  
  BILL: SB 828   	Page 13 
 
The scope of the access-to-courts provision has been addressed by Florida courts on 
multiple occasions.
45
 In Kluger, the Florida Supreme Court interpreted the access-to-
courts guarantee to mean that the legislature cannot abolish a statutory or common law 
right that existed prior to the adoption of the Declaration of Rights without providing a 
reasonable alternative, unless the legislature can show an overpowering public necessity 
for the abolishment of such right, and no alternative method of meeting such public 
necessity can be shown.
46
 Though Kluger spoke in terms of total abolishment of a right, 
the scope of the protection extends to circumstances in which legislative action 
significantly obstructs the right to access to the courts.
47
 Thus, a statute restricting access 
to the courts is not permitted unless one of the Kluger exceptions is met: (i) the 
legislature provides a reasonable alternative remedy or commensurate benefit; or (ii) the 
legislature makes a showing of overpowering public necessity for the abolishment of the 
right and no alternative method of meeting such public necessity.”
48
  
 
Here, the bill provides that if a court determines that a defendant in any civil action based 
on a cybersecurity-breach-related claim made a good faith
49
 effort to comply with the 
July 2024 General Requirements or the July 2026 Procurement Requirements, the 
defendant is immune from liability. The exemption from liability based on a “good faith 
effort to comply” could be interpreted as an obstacle to an injured party’s right to access 
the courts in a claim of negligence related to a cybersecurity-breach related event. 
V.  Fiscal Impact Statement: 
A. Tax/Fee Issues: 
None. 
B. Private Sector Impact: 
Private entities who qualify as an “asset owner” will incur additional costs in meeting the 
requirements under the bill for specified compliance with the IEC 62443. 
C. Government Sector Impact: 
Governmental entities who qualify as an “asset owner” will incur additional costs in 
meeting the requirements under the bill for specified compliance with the IEC 62443. 
                                                
45
 See, e.g., Nationwide Mut. Fire Ins. Co. v. Pinnacle Med., Inc., 753 So.2d 55 (Fla.2000); Psychiatric Assocs. v. Siegel, 610 
So.2d 419 (Fla.1992); Smith v. Dep't of Ins., 507 So.2d 1080 (Fla.1987); Carter v. Sparkman, 335 So.2d 802 
(Fla.1976), receded from on other grounds in Aldana v. Holub, 381 So.2d 231 (Fla.1980); Kluger v. White, 281 So.2d 1 
(Fla.1973); Lloyd v. Farkash, 476 So.2d 305 (Fla. 1st DCA 1985).  
46
 Kluger v. White, 281 So. 2d 1, 4 (Fla. 1973). 
47
 Weaver v. Myers, 229 So. 3d 1118, 1140 (Fla. 2017); Mitchell v. Moore, 786 So. 2d 521, 527 (Fla. 2001)(“…in order to 
find that a right has been violated it is not necessary for the statute to produce a procedural hurdle which is absolutely 
impossible to surmount, only one which is significantly difficult”). 
48
 Samples v. Florida Birth-Related Neurological Injury Comp. Ass'n, 114 So. 3d 912, 920 (Fla. 2013). 
49
 Black’s Law defines the term “good faith” to mean “a state of mind consisting in (1) honesty in belief or purpose, (2) 
faithfulness to one's duty or obligation, (3) observance of reasonable commercial standards of fair dealing in a given trade or 
business, or (4) absence of intent to defraud or to seek unconscionable advantage.” Black's Law Dictionary (11th ed. 2019). 
  BILL: SB 828   	Page 14 
 
Additionally, the Department of Law Enforcement will incur indeterminate costs in 
meeting its responsibilities under the bill.  
VI. Technical Deficiencies: 
None. 
VII. Related Issues: 
None. 
VIII. Statutes Affected: 
This bill creates section 943.6873, F.S. 
IX. Additional Information: 
A. Committee Substitute – Statement of Changes: 
(Summarizing differences between the Committee Substitute and the prior version of the bill.) 
None. 
B. Amendments: 
None. 
This Senate Bill Analysis does not reflect the intent or official position of the bill’s introducer or the Florida Senate.