Florida 2022 2022 Regular Session

Florida Senate Bill S1670 Analysis / Analysis

Filed 03/02/2022

                    The Florida Senate 
BILL ANALYSIS AND FISCAL IMPACT STATEMENT 
(This document is based on the provisions contained in the legislation as of the latest date listed below.) 
Prepared By: The Professional Staff of the Committee on Appropriations  
 
BILL: CS/CS/SB 1670 
INTRODUCER:  Appropriations Committee; Military and Veterans Affairs, Space, and Domestic Security 
Committee; and Senator Hutson 
SUBJECT:  Cybersecurity 
DATE: March 2, 2022 
 
 ANALYST STAFF DIRECTOR  REFERENCE  	ACTION 
1. Lloyd Caldwell MS Fav/CS 
2. Hunter Sadberry AP Fav/CS 
 
Please see Section IX. for Additional Information: 
COMMITTEE SUBSTITUTE - Substantial Changes 
 
I. Summary: 
CS/CS/SB 1670 modifies cybersecurity training and reporting standards for state agencies and 
local governments. 
 
The State Cybersecurity Act requires the Florida Digital Service (FLDS) and the heads of state 
agencies to meet certain requirements to enhance the cybersecurity of state agencies. Currently, 
state agencies must provide cybersecurity training to their employees, report cybersecurity 
incidents, and adopt cybersecurity standards. However, there are no such requirements for 
counties and municipalities (local governments). 
 
Current law regarding state or local government cybersecurity does not specifically address 
ransomware, which is a form of malware designed to encrypt files on a device, rendering any 
files unusable. Malicious actors then demand ransom in exchange for decryption. 
 
The bill prohibits state agencies and local governments from paying or otherwise complying with 
a ransomware incident. 
 
The bill defines the severity level of a cybersecurity incident in accordance with the National 
Cyber Incident Response Plan. State agencies and local governments must report all ransomware 
incidents and high severity level cybersecurity incidents to the Cybersecurity Operations Center 
(CSOC) and the Cybercrime Office within the Florida Department of Law Enforcement as soon 
as possible but no later than a time certain. Local governments must also report to the sheriff. 
REVISED:   BILL: CS/CS/SB 1670   	Page 2 
 
The bill requires state agencies to report low level cybersecurity incidents and provides that local 
governments may report such incidents. The bill also requires state agencies and local 
governments to submit after-action reports to the FLDS following a cybersecurity or ransomware 
incident. 
 
The bill requires the CSOC to notify the Legislature of high severity level cybersecurity 
incidents. The notice must contain a high-level overview of the incident and its likely effects. In 
addition, the CSOC must provide the Legislature and the Cybersecurity Advisory Council (CAC) 
with a consolidated incident report on a quarterly basis. 
 
The bill requires state agency and local government employees to undergo certain cybersecurity 
training within 30 days of employment and annually thereafter. 
 
The bill requires local governments to adopt cybersecurity standards that safeguard the local 
government’s data, information technology (IT), and IT resources. 
 
The bill expands the purpose of the CAC to include advising local governments on cybersecurity 
and requires the CAC to examine reported cybersecurity and ransomware incidents to develop 
best practice recommendations. The CAC must submit an annual comprehensive report 
regarding ransomware to the Governor and Legislature. 
 
The bill establishes penalties and fines for certain ransomware offenses against a government 
entity. 
 
The bill will likely have a negative fiscal impact on state and local government expenditures; 
however, the bill may also have a positive fiscal impact on the state due to the punitive fine 
established in the bill. See Fiscal Analysis & Economic Impact Statement.   
 
The bill’s effective date is July 1, 2022. 
II. Present Situation: 
General Background 
Ransomware is a form of malware
1
 that is used by malicious actors to encrypt files on devices, 
networks, or computer systems, rendering the files on those systems unusable. The malicious 
actors then demand ransom in exchange for decryption or the return of an individual’s or an 
organization’s files. Ransomware actors will also often threaten to sell or leak the data or 
information if the demanded ransom is not paid.  
 
The number of ransomware incidents continues to rise, with 2,474 incidents reported with 
adjusted losses of over $29.1 million,
2
 a figure that is likely under-inclusive, as technology 
                                                
1
 “Malware” means hardware, firmware, or software that is intentionally included or inserted in a system for a harmful 
purpose.  See https://csrc.nist.gov/glossary/term/malware (last visited Feb. 4, 2022). 
2
 Federal Bureau of Investigation, Internet Crime Complaint Center, 2020 Internet Crime Report, Business Email 
Compromise (BEC), p.14, available at https://www.ic3.gov/Media/PDF/AnnualReport/2020_IC3Report.pdf (last visited 
Feb. 2, 2022).  BILL: CS/CS/SB 1670   	Page 3 
 
experts believe that many ransomware attacks go unreported out of embarrassment by victims 
who decline to report. In its reporting, the Federal Bureau of Investigation (FBI) formally 
describes ransomware as: 
 
A type of malicious software, or malware, that encrypts data on a 
computer making it unusable. A malicious cybercriminal holds the data 
hostage until the ransom is paid. If the ransom is not paid, the victim’s 
data remains unavailable. Cyber criminals may also pressure victims to 
pay the ransom by threatening to destroy the victim’s data or to release it 
to the public.
3
 
 
The Internet Crime Complaint Center (IC3), housed within the FBI received a record number of 
complaints from the American public in 2020: 791,790, with the reported losses attached to those 
complaints exceeding $4.1 billion.
4
 This represents a 69 percent increase in total complaints 
from 2019. 
 
Recent ransomware attacks that impacted the American economy include: 
 The Colonial Pipeline shutdown in May 2021, which disrupted the flow of refined gasoline 
and jet fuel through 5,500 miles of pipeline from Texas to New York.
5
 
o Colonial supplied 45 percent of the East Coast’s fuel supply. 
o As a private company, Colonial had no duty to report; however, the FBI and federal 
investigative agencies at the time did confirm involvement in the investigation.
6
  
o A ransom of 75 Bitcoin was paid a day after Colonial’s network system was breached, 
and a total ransom, which was the equivalent of nearly $5 million in cryptocurrency was 
eventually paid for the software decryption key to unlock its networks.
7
 
 JBS, the world’s largest meat processing plant, was hit by a ransomware attack in June 
2021:
8
  
o The plant is responsible for supplying one quarter of America’s beef.
9
 
o The likely Russian-based hackers threatened disruption or deletion of network files 
unless a ransom was paid. 
o Ultimately, JBS paid a ransom in Bitcoin of $11 million to resolve the cyberattack.
10
 
 
Specifically, in Florida, recent cybersecurity and ransomware incidents include: 
 A February 2021 intrusion into the City of Oldsmar’s water system. The remote hacker 
briefly increased the amount of sodium hydroxide (lye) from 100 parts per million to 11,100 
                                                
3 
Id. 
4
 Id, p.3. 
5 
David E. Sanger, et al, Cyberattack forces a shutdown of a top U.S. Pipeline, THE NEW YORK TIMES (May 13, 2021) 
available at https://www.nytimes.com/2021/05/08/us/politics/cyberattack-colonial-pipeline.html (last visited Feb. 2, 2022). 
6
 Id. 
7,
 
8, 9
 Associated Press, Colonial Pipeline confirms it paid $4.4m to hacker gang after attack (May 19, 2021), THE GUARDIAN, 
available at https://www.theguardian.com/technology/2021/may/19/colonial-pipeline-cyber-attack-ransom (last visited 
Jan. 23, 2022). 
8
 JBS: Cyber-Attack hits world’s largest meat supplier, BBC.COM, available at https://www.bbc.com/news/world-us-canada-
57318965 (last visited Jan. 22, 2022). 
9
 Id. 
10
 Meat Giant JBS pays $11m in ransom to resolve cyberattack, BBC.COM, available at https://www.bbc.com/news/business-
57423008 (last visited Jan. 23, 2022).  BILL: CS/CS/SB 1670   	Page 4 
 
parts per million, more than 100 times the normal level. The increased amount was caught 
before the public was harmed.  
 The St. Lucie County’s Sheriff’s Department was hit by a cyberattack in December 2020 
when public records were taken and held for $1 million ransom and sheriff employees briefly 
resorted to filing reports using pen and paper instead.   
 In Wakulla County in 2019, the school district’s insurer paid a Bitcoin ransom to hackers to 
bring its computers back online during the first few weeks of the 2019-2020 school year. 
 
Colonial Pipeline and JBS are just two examples from the thousands of other reports investigated 
by the IC3 in 2021. The United States is the number one target for cyberattacks with expected 
increases in both cyberattacks and particularly, ransomware attacks, according to statistics from 
the University of West Florida’s Center for Cybersecurity.
11
 
 
National Institute for Standards and Technology Cybersecurity Framework 
The National Institute for Standards and Technology (NIST) is a non-regulatory federal agency 
housed within the United States Department of Commerce. The NIST is charged with providing 
a prioritized, flexible, repeatable, performance-based, and cost-effective framework that helps 
owners and operators of critical infrastructure identify, assess, and manage cyber risk. While the 
framework was developed with critical infrastructure in mind, it can be used by organizations in 
any sector of the economy or society.
12
 The framework is designed to complement, and not 
replace, an organization’s own unique approach to cybersecurity risk management. As such, 
there are a variety of ways to use the framework and the decision about how to apply it is left to 
the implementing organization. For example, an organization may use its current processes and 
consider the framework to identify opportunities to strengthen its cybersecurity risk 
management. Overall, the framework provides an outline of best practices that helps 
organizations decide where to focus resources for cybersecurity protection.
13
 
 
National Cyber Incident Response Plan 
The National Cyber Incident Response Plan (NCIRP) was developed according to the direction 
of Presidential Policy Directive (PPD)-41,
14
 by the U.S. Department of Homeland Security. The 
NCIRP is part of the broader National Preparedness System and establishes the strategic 
framework for a whole-of-Nation approach to mitigating, responding to, and recovering from 
cybersecurity incidents posing risk to critical infrastructure.
15
 The NCIRP is not a tactical or 
operational plan; rather, it serves as the primary strategic framework for stakeholders to 
understand how federal departments and agencies and other national-level partners provide 
resources to support response operations. The NCIRP was developed in coordination with 
                                                
11
 Eman El Sheikh, Ph.D., Center for Cybersecurity, University of West Florida, Cybersecurity Education and Workforce 
Development Highlights (January 17, 2020 Presentation to Florida Cybersecurity Task Force Meeting, January 17, 2020), 
available at CSTF_01.17.20_Meeting_Materials.pdf (myflorida.com) (last visited Jan. 23, 2022). 
12
 National Institute of Standards and Technology, Framework for Improving Critical Infrastructure Cybersecurity, available at 
https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf (last visited Jan. 30, 2022). 
13
 Id. 
14
 Annex for PPD-41: U.S. Cyber Incident Coordination, available at https://obamawhitehouse.archives.gov/the-press- 
office/2016/07/26/annex-presidential-policy-directive-united-states-cyber-incident (last visited Feb. 18, 2022). 
15
 U.S. Department of Homeland Security, National Cyber Incident Response Plan (December 2016) available at 
file:///C:/Users/Villa.Chris/Downloads/798128% 20(7).pdf (last visited Feb. 20, 2022).  BILL: CS/CS/SB 1670   	Page 5 
 
federal, state, local, and private sector entities and is designed to interface with industry best 
practice standards for cybersecurity, including the NIST Cybersecurity Framework. 
 
The NCIRP adopted a common schema for describing the severity of cybersecurity incidents 
affecting the U.S. The schema establishes a common framework to evaluate and assess 
cybersecurity incidents to ensure that all departments and agencies have a common view of the 
severity of a given incident; urgency required for responding to a given incident; seniority level 
necessary for coordinating response efforts; and level of investment required for response 
efforts.
16
 
 
Figure 1: Cybersecurity Incident Severity Schema 
 
 
                                                
16
 Id.  BILL: CS/CS/SB 1670   	Page 6 
 
Florida Information Protection Act of 2014 
The Florida Information Protection Act of 2014
17
 requires notice be given to affected customers 
and the Department of Legal Affairs (DLA) when a breach of personal information occurs. The 
notice must be provided within 30 days of the discovery of the breach or the belief that a breach 
has occurred, unless law enforcement has requested a delay for investigative purposes or for 
other good cause. State law requires Florida’s Attorney General to file with the Legislature, 
every February 1
st
, a report identifying any governmental entities that have reported any breaches 
of security of themselves or by any of its third-party agents in the preceding calendar year. 
Additionally, the Attorney General must report on any breaches by any governmental entities 
affecting more than 500 individuals in this state as expeditiously as possible, but not later than 30 
days after the determination of the breach or reason to believe the breach has occurred. An 
extension of up to 15 days may be granted if good cause is provided in writing to the DLA. 
 
Enforcement authority is provided to the DLA under the Florida Deceptive and Unfair Trade 
Practices Act to prosecute violations. Violators may be subject to civil penalties if a breach 
notification is not provided on a timely basis, but there are not civil penalties for the timely 
report of a security breach. There are exceptions for those entities that are also required to report 
breaches to federal regulators. 
 
Data Breach Reporting Within Florida Law 
Florida is within the FBI’s top ten states for total number of victims reporting a data breach for 
2020, falling behind only California with 53,793 victims
18
 and is fourth in the total amount of 
victim loss reported at $295 million for 2020.
19
 
 
The Attorney General’s office website posts notices and news releases relating to several multi-
state settlements because of data breaches which are listed through litigation settlements and 
press releases on the site.
 20
 
Information Technology Management 
The Department of Management Services (DMS)
21
 oversees information technology (IT)
22
 
governance and security for the executive branch of state government. The Florida Digital 
Service (FLDS) within the DMS was established by the Legislature in 2020 to replace the 
                                                
17
 Ch. 2014-189, Laws of Fla. (creating s. 501.171, F.S., effective July 1, 2014; Florida Information Protection Act). 
18
 Supra, note 2. 
19
 Id. at 24. 
20
 Office of Attorney General Ashley Moody, In the News – News Search (search conducted January 24, 2022), available at 
http://www.myfloridalegal.com/newsrel.nsf/newsreleases (last visited Jan. 24, 2022). 
21
 See s. 20.22, F.S. 
22
 The term “information technology” means equipment, hardware, software, firmware, programs, systems, networks, 
infrastructure, media, and related material used to automatically, electronically, and wirelessly collect, receive, access, 
transmit, display , store, record, retrieve, analyze, evaluate, process, classify, manipulate, manage, assimilate, control, 
communicate, exchange, convert, converge, interface, switch, or disseminate information of any kind or form. 
Section 282.0041(20), F.S. 12 Ch. 2020-161, Laws of Fla.  BILL: CS/CS/SB 1670   	Page 7 
 
Division of State Technology.
23
 The head of FLDS is appointed by the Secretary of Management 
Services
24
 and serves as the state chief information officer (CIO).
25
 
 
The FLDS was created to propose innovative solutions that securely modernize state 
government, including technology and information services, to achieve value through digital 
transformation and interoperability, and to fully support Florida’s cloud first policy.
26
 
Accordingly, the DMS through the FLDS has the following powers, duties, and functions: 
 Develop IT policy for the management of the state’s IT resources. 
 Develop an enterprise architecture. 
 Establish project management and oversight standards with which state agencies
27
 must 
comply when implementing IT projects. 
 Perform project oversight on state agency IT projects that have a total cost of $10 million or 
more and that are funded in the General Appropriations Act or any other law.
28
 
 Identify opportunities for standardization and consolidation of IT services that support 
interoperability, Florida’s cloud first policy, and business functions and operations that are 
common across state agencies.
29
 
 
State Cybersecurity Act 
The State Cybersecurity Act
30
 requires the DMS and the heads of state agencies
31
 to meet certain 
requirements to enhance the cybersecurity
32
 of state agencies. Specifically, the DMS, acting 
through the FLDS must: 
 Establish standards and processes for assessing state agency cybersecurity risks and 
determining appropriate security measures consistent with generally accepted best practices 
for cybersecurity, including the NIST cybersecurity framework. 
                                                
23
 Ch. 2020-161, Laws of Fla. 
24
 The Secretary of Management Services serves as the head of the Department of Management Services (DMS) and is 
appointed by the Governor, subject to confirmation by the Senate. Section 20.22(1), F.S. 
25
 Section 282.0051(2)(a), F.S. 
26
 Section 282.0051(1), F.S. 
27
 “State agency” means any official, officer, commission, board, authority, council, committee, or department of the 
executive branch of state government; the Justice Administrative Commission; and the Public Service Commission. The term 
does not include university boards of trustees, state universities, the Department of Legal Affairs, the Department of 
Agriculture and Consumer Services, or the Department of Financial Services. Section 282.0041(33), F.S. 
28
 For the Department of Financial Services, the Department of Legal Affairs, and the Department of Agriculture and 
Consumer Services, Florida Digital Service (FLDS) provides project oversight on information technology (IT) projects that 
have a total cost of $20 million or more. Section 282.0051(1)(n), F.S. 
29
 Section 282.0051(1), F.S. 
30
 Section 282.318, F.S. 
31
 For purposes of the State Cybersecurity Act, the term “state agency” includes the Department of Legal Affairs, the 
Department of Agriculture and Consumer Services, and the Department of Financial Services. Section 282.318(2), F.S. 
32
 “Cybersecurity” means the protection afforded to an automated information system in order to attain the applicable 
objectives of preserving the confidentiality, integrity, and availability of data, information, and information technology 
resources. Section 282.0041(8), F.S.  BILL: CS/CS/SB 1670   	Page 8 
 
 Adopt rules to mitigate risk, support a security governance framework, and safeguard state 
agency digital assets, data,
33
 information, and IT resources
34
 to ensure availability, 
confidentiality, and integrity. 
 Designate a chief information security officer (CISO) responsible for the development, 
operation, and oversight of cybersecurity for state technology systems. The CISO must be 
notified of all confirmed or suspected incidents or threats of state agency IT resources and 
must report such information to the CIO and the Governor. 
 Develop and annually update a statewide cybersecurity strategic plan that includes security 
goals and objectives for cybersecurity, including the identification and mitigation of risk, 
proactive protections against threats, tactical risk detection, threat reporting, and response 
and recovery protocols for cyber incidents.
35
 
 Develop and publish for use by state agencies a cybersecurity governance framework. 
 Assist state agencies in complying with the State Cybersecurity Act. 
 In collaboration with the Cybercrime Office within the Florida Department of Law 
Enforcement (FDLE), annually provide training for state agency information security 
managers and computer security incident response team members that contains training on 
cybersecurity, including cybersecurity threats, trends, and best practices. 
 Annually review the strategic and operational cybersecurity plans of state agencies. 
 Track, in coordination with agency inspectors general, state agencies’ implementation of 
remediation plans. 
 Provide cybersecurity training to all state agency technology professionals that develops, 
assesses, and documents competencies by role and skill level. The training may be provided 
in collaboration with the Cybercrime Office, a private sector entity, or an institution of the 
state university system. 
 Operate and maintain a Cybersecurity Operations Center led by the CISO to serve as a 
clearinghouse for threat information and to coordinate with the FDLE to support state agency 
response to cybersecurity incidents. 
 Lead an Emergency Support Function under the state comprehensive emergency 
management plan.
36
 
 
The State Cybersecurity Act requires the head of each state agency to designate an information 
security manager to administer the cybersecurity program of the state agency.
37
 In addition, the 
head of each state agency must: 
 Establish an agency cybersecurity incident response team in consultation with FLDS and the 
Cybercrime Office. The agency cybersecurity incident response team must convene upon 
notification of a cybersecurity incident and must immediately report all confirmed or 
suspected incidents to the CISO. 
                                                
33
 “Data” means a subset of structured information in a format that allows such information to be electronically retrieved and 
transmitted. Section 282.0041(9), F.S. 
34
 “Information technology resources” means data processing hardware and software and services, communications, supplies, 
personnel, facility resources, maintenance, and training. Section 282.0041(22), F.S. 
35
 “Incident” means a violation or imminent threat of violation, whether such violation is accidental or deliberate, of 
information technology resources, security, policies, or practices. An imminent threat of violation refers to a situation in 
which the state agency has a factual basis for believing that a specific incident is about to occur. 
Section 282.0041(19), F.S. 
36
 Section 282.318(3), F.S. 
37
 Section 282.318(4)(a), F.S.  BILL: CS/CS/SB 1670   	Page 9 
 
 Annually submit to the DMS the state agency’s strategic and operational cybersecurity plans. 
 Conduct and update every three years a comprehensive risk assessment to determine the 
security threats to the data, information, and IT resources of the state agency. 
 Develop and periodically update written internal policies and procedures, including 
procedures for reporting cybersecurity incidents and breaches to the FLDS and the 
Cybercrime Office. 
 Implement managerial, operational, and technical safeguards and risk assessment 
remediation plans recommended by the DMS to address identified risks to the data, 
information, and IT resources of the agency. 
 Ensure that periodic internal audits and evaluations of the agency’s cybersecurity program 
for the data, information, and IT resources of the agency are conducted. 
 Ensure that the cybersecurity requirements included as written specifications within a 
solicitation, contract, and service-level agreement of IT and IT resources and services meet 
or exceed applicable state and federal laws, regulations, and standards for cybersecurity, 
including the NIST cybersecurity framework. 
 Provide cybersecurity awareness training to all state agency employees within 30 days of 
commencing employment concerning cybersecurity risks and the responsibility of employees 
to comply with policies, standards, guidelines, and operating procedures adopted by the state 
agency to reduce those risks. The training may be provided in collaboration with the 
Cybercrime Office, a private sector entity, or an institution of the state university system. 
 Develop a process that is consistent with the rules and guidelines established by the FLDS 
for detecting, reporting, and responding to threats, breaches, or cybersecurity incidents.
38
 
 
Florida Cybersecurity Advisory Council 
The Florida Cybersecurity Advisory Council (CAC) within the DMS
39
 assists state agencies in 
protecting IT resources from cyber threats and incidents.
40
 The CAC must assist the FLDS in 
implementing best cybersecurity practices, taking into consideration the final recommendations 
of the Florida Cybersecurity Task Force – a task force created to review and assess the state’s 
cybersecurity infrastructure, governance, and operations.
41
 The CAC meets at least quarterly to: 
 Review existing state agency cybersecurity policies. 
 Assess ongoing risks to state agency IT. 
 Recommend a reporting and information sharing system to notify state agencies of new risks. 
 Recommend data breach simulation exercises. 
 Assist the FLDS in developing cybersecurity best practice recommendations for state 
agencies, including continuous risk monitoring, password management, and protecting data 
in legacy and new systems. 
 Examine inconsistencies between state and federal law regarding cybersecurity.
42
 
 
The CAC must work with the NIST and other federal agencies, private sector businesses, and 
private security experts to identify which local infrastructure sectors, not covered by federal law, 
                                                
38
 Section 282.318(4), F.S. 
39
 Section 282.319(1), F.S. 
40
 Section 282.319(2), F.S. 
41
 Section 282.319(3), F.S. 
42
 Section 282.319(9), F.S.  BILL: CS/CS/SB 1670   	Page 10 
 
are at the greatest risk of cyber-attacks and to identify categories of critical infrastructure as 
critical cyber infrastructure if cyber damage to the infrastructure could result in catastrophic 
consequences.
43
 
 
Beginning June 30, 2022, and each June 30 thereafter, the CAC must submit to the Legislature 
any recommendations considered necessary by the CAC to address cybersecurity.
44
 
 
Offenses against Users of Computers 
Florida law criminalizes the following acts involving a computer,
45
 computer system,
46
 computer 
network,
47
 or electronic device
48
 when done knowingly, willfully, and without authorization: 
 Accessing
49
 or causing to be accessed any computer, computer system, computer network, or 
electronic device with knowledge that such access is unauthorized or the manner or use 
exceeds authorization. 
 Disrupting or denying the ability to transmit data to or from an authorized user of a 
computer, computer system, computer network, or electronic device under certain 
circumstances. 
 Destroying, taking, injuring, or damaging computers, computer systems, computer networks, 
or electronic devices. 
 Introducing a computer contaminant into a computer, computer system, computer network, 
or electronic device. 
 Engaging in audio or video surveillance of an individual by accessing one of the inherent 
features or components of a computer, computer system, computer network, or electronic 
device, including accessing the data or information stored by a third party.
50
 
 
                                                
43
 Section 282.319(10), F.S. 
44
 Section 282.319(11), F.S. 
45
 “Computer” means an internally programmed, automatic device that performs data processing. Section 815.03(2), F.S.
 
 
46 
“Computer system” means a device or collection of devices, including support devices, one or more of which contain 
computer programs, electronic instructions, or input data and output data, and which perform functions, including, but not 
limited to, logic, arithmetic, data storage, retrieval, communication, or control. The term does not include calculators that 
are not programmable and             that are not capable of being used in conjunction with external files. Section 815.03(7), F.S. 
47
 “Computer network” means a system that provides a medium for communication between one or more computer systems 
or electronic devices, including communication with an input or output device such as a display terminal, printer, or 
other electronic equipment that is connected to the computer systems or electronic devices by physical or wireless 
telecommunication facilities. Section 815.03(4), F.S. 
48
 “Electronic device” means a device or a portion of a device that is designed for and capable of communicating across a 
computer network with other computers or devices for the purpose of transmitting, receiving, or storing data, including, but 
not limit ed to, a cellular telephone, tablet, or other portable device designed for and capable of communicating with or 
across a computer network and that is actually used for such purpose. Section 815.03(9), F.S. 
49
 “Accessing” means approaching, instructing, communicating with, storing data in, retrieving data from, or otherwise 
making use of any resources of a computer, computer system, computer network, or electronic device. Section 815.03(1), 
F.S. 
50
 Section 815.06(2), F.S.   BILL: CS/CS/SB 1670   	Page 11 
 
In general, such conduct against a computer user is a third degree felony,
51
 punishable by up to 
five years in prison and a $5,000 fine.
52
 However, the crime may be enhanced to a second
53
 or 
first
54
 degree felony with aggravating factors, such as excessive damage or endangering a human 
life.
55
 
 
Unfunded Local Government Mandates 
An unfunded mandate on local government is defined in Florida’s Constitution as a general law 
which requires counties or municipalities to spend its funds, limits their ability to raise revenue, 
or limits their ability to receive sales tax revenue. Adopted by Florida voters in 1990, Article VII, 
Section 18(a) of the Florida Constitution states that no county or municipality shall be bound by 
any general law requiring such county or municipality to spend its funds or to take an action 
requiring the expenditure of funds except under certain conditions. The review process is only 
applied to general laws applicable to cities and counties and not to special districts or school 
districts. 
 
Article VII, s. 18 of the Florida Constitution requires also that such laws fulfill an important state 
interest and meet one of the following conditions for constitutionality: 
 The Legislature has provided or will provide the estimated amount of funds necessary to fund 
the mandated activity or program; 
 The Legislature has provided or will provide the county or municipality the authorization to 
enact a funding source not available to them before February 1, 1989, that can be used to 
generate the amount of funds sufficient to meet the mandate by a simple majority vote for the 
governing body; 
 The law passes by a two-thirds membership vote of each house of the Legislature; 
 The expenditure is required to comply with a law that applies to all persons similarly 
situated, including the state and local governments; or 
 The law is required to comply with a federal requirement or is required to comply with a 
federal entitlement. 
 
If none of the constitutional exceptions or exemptions apply, and if the bill becomes law, cities 
and counties are not bound by the law
56
 unless the Legislature has determined that the bill fulfills 
an important state interest and approves the bill by a two-thirds vote of the membership of each 
house. A Legislature can meet the condition “meets an important state interest” through a 
legislative declaration and a declaratory statement that the legislation does meet an important 
state interest. 
 
                                                
51
 Section 815.06(3)(a), F.S. 
52
 Section 775.082 and 775.083, F.S. 
53
 A second degree felony is punishable by up to 15 years in prison and a $10,000 fine. Sections 775.082 and 775.083, 
F.S. 
54
 A first degree felony is punishable by up to 30 years in prison and a $10,000 fine. Sections 775.082 and 775.083, F.S. 
55
 Section 815.06(3)(b) and (3)(c), F.S. 
56 
Although the constitution says, “[n]o county or municipality shall be bound by any general law” that is a mandate, the 
circuit court’s ruling was much broader in that it ordered SB 360 expunged completely from the official records of the state.  BILL: CS/CS/SB 1670   	Page 12 
 
A mandate can still be prohibited if the effect of its enactment results in a reduction in the county 
or municipality’s authority to raise total aggregate revenues or is a reduction in the total 
percentage share of revenue as it existed on February 1, 1989.  
 
Mandates can be exempted in certain circumstances, such as, if the law is being enacted during a 
declared fiscal emergency, when offsetting revenues are provided for, or when the fiscal impact 
is considered insignificant. The Legislature interprets insignificant fiscal impact to mean an 
amount not greater than the average statewide population for the applicable fiscal year times 
10 cents (currently $2.3 million); the average fiscal impact, including any offsetting effects over 
the long term, is also considered.
57
 
III. Effect of Proposed Changes: 
Ransomware Incident 
The bill defines “ransomware incident” to mean a malicious cybersecurity incident in which a 
person or entity introduces software that gains unauthorized access to or encrypts, modifies, or 
otherwise renders unavailable a state agency’s or local government’s
58
 data and thereafter the 
person or entity demands a ransom to restore access to the data, prevent publication of the data, 
or otherwise remediate the impact of the software. The bill prohibits a state agency or local 
government experiencing a ransomware incident from paying or otherwise complying with the 
demanded ransom. 
 
Cybersecurity and Ransomware Incident Notification 
The bill defines the severity level of a cybersecurity incident in accordance with the National 
Cyber Incident Response Plan (NCIRP) as follows: 
 Level 5: An emergency-level incident within the specified jurisdiction if the incident poses 
an imminent threat to the provision of wide-scale critical infrastructure services; national, 
state, or local security; or the lives of the country’s, state’s, or local government’s citizens. 
 Level 4: A severe-level incident if the incident is likely to result in a significant impact 
within the affected jurisdiction which affects the public health or safety; national, state, or 
local security; economic security; or individual civil liberties. 
 Level 3: A high-level incident if the incident is likely to result in a demonstrable impact in 
the affected jurisdiction to public health or safety; national, state, or local security; economic 
security; civil liberties; or public confidence. 
 Level 2: A medium-level incident if the incident may impact public health or safety; national, 
state, or local security; economic security; civil liberties; or public confidence. 
 Level 1: A low-level incident if the incident is unlikely to impact public health or safety; 
national, state, or local security; economic security; or public confidence. 
 
                                                
57 
Guidelines issued in 1991 by then-Senate President Gwen Margolis and Speaker of the House Wetherell (1991); Comm. 
On Comprehensive Planning, Local and Military Affairs, The Florida Senate, Review of Legislative Staff Guidelines for 
Screening Bills for Mandates on Florida Counties and Municipalities (Interim Report 2000-24)(Sept. 1999), available at 
http://www.leg.state.fl.us/data/Publications/2000/Senate/reports/interim_reports/pdf/00-24ca.pdf (last visited Jan. 26, 2022). 
58
 The bill defines “local government” to mean a county or a municipality.  BILL: CS/CS/SB 1670   	Page 13 
 
The bill requires state agencies and local governments to report all ransomware incidents as soon 
as possible, but no later than 12 hours after discovery of the incident. It also requires state 
agencies and local governments to report cybersecurity incidents determined to be of severity 
level three, four, or five as soon as possible, but no later than 48 hours after discovery of the 
incident. Local governments may report cybersecurity incidents determined to be of severity 
level one or two and state agencies are required to report such incidents as soon as possible. State 
agencies and local governments report the incidents to the Cybersecurity Operations Center 
(CSOC) and Cybercrime Office; however, local governments are also required to report to the 
sheriff that has jurisdiction over the local government. 
 
The bill specifies the information that must be reported in a cybersecurity or ransomware 
incident report by a state agency or local government. The incident report must include, at a 
minimum: 
 A summary of the facts surrounding the cybersecurity or ransomware incident. 
 The date on which the state agency or local government most recently backed up its data, the 
physical location of the backup, if the backup was affected, and if the backup was created 
using cloud computing. 
 The types of data compromised by the cybersecurity or ransomware incident. 
 The estimated fiscal impact of the cybersecurity or ransomware incident. 
 In the case of a ransomware incident, the details of the ransom demanded. 
 If the reporting entity is a local government, a statement requesting or declining assistance 
from the CSOC, Cybercrime Office, or sheriff. 
 
The bill requires the CSOC to notify the President of the Senate and the Speaker of the House of 
Representatives of any cybersecurity incident with a severity level of three, four, or five within 
12 hours of receiving the state agency or local government incident report. The notification must 
include a high-level description of the incident and the likely effects. In addition, the CSOC must 
provide consolidated incident reports to the President of the Senate, Speaker of the House of 
Representatives, and Cybersecurity Advisory Council (CAC) on a quarterly basis. The 
consolidated incident reports to the CAC may not contain any state agency or local government 
name, network information, or system identifying information, but must contain sufficient 
relevant information to allow the CAC to fulfill its responsibilities. 
 
After-action Reports 
The bill requires state agencies and local governments to submit an after-action report to Florida 
Digital Service (FLDS) within one week of the remediation of a cybersecurity or ransomware 
incident. The after-action report must summarize the incident, the incident’s resolution, and any 
insights gained as a result of the incident. By December 1, 2022, the FLDS must establish 
guidelines and processes for submitting after-action reports. 
 
Cybersecurity Training 
The bill requires the FLDS to develop a basic and advanced cybersecurity training curriculum. 
All local government employees with access to the local government’s network must complete 
the basic training curriculum, and local government technology professionals and employees 
with access to highly sensitive information must complete the advanced training curriculum. The  BILL: CS/CS/SB 1670   	Page 14 
 
trainings must be completed by employees within 30 days of commencing employment and on 
an annual basis thereafter. The bill authorizes the FLDS to provide the cybersecurity trainings in 
collaboration with the Cybercrime Office, a private sector entity, or an institution of the State 
University System. 
 
The bill requires the advanced cybersecurity training currently provided by the FLDS to state 
agency technology professionals to be provided on an annual basis and to be provided to 
employees with access to highly sensitive information. In addition, state agency heads must 
provide the basic cybersecurity training that is currently provided to agency employees on an 
annual basis. 
 
The bill requires the advanced cybersecurity training curriculum provided to certain state and 
local government employees to include training on the identification of each cybersecurity 
incident severity level. 
 
Local Government Cybersecurity Standards 
The bill requires local governments to adopt cybersecurity standards that safeguard the local 
government’s data, IT, and IT resources to ensure availability, confidentiality, and integrity. The 
standards must be consistent with generally accepted best practices for cybersecurity, including 
the National Institute for Standards and Technology (NIST) cybersecurity framework. Counties 
with a population of 75,000 or more and municipalities with a population of 25,000 or more must 
adopt the standards by January 1, 2024. Counties with a population less than 75,000 and 
municipalities with a population less than 25,000 must adopt the standards by January 1, 2025. 
The bill requires each local government to notify the FLDS when it has adopted the standards. 
 
Florida Cybersecurity Advisory Council 
The bill provides that one of the purposes of the CAC is to advise local governments on 
cybersecurity, including cybersecurity threats, trends, and best practices. In addition, the bill 
requires the CAC to review information relating to cybersecurity and ransomware incidents 
reported by state agencies and local governments to determine commonalities and develop best 
practice recommendations for those entities. The CAC must recommend any additional 
information that should be reported by a local government to the FLDS as part of a cybersecurity 
or ransomware incident report. 
 
Beginning December 1, 2022, and each December 1 thereafter, the CAC must prepare and 
submit a comprehensive report to the Governor, the President of the Senate, and the Speaker of 
the House of Representatives that includes data, trends, analysis, findings, and recommendations 
for state and local action regarding ransomware incidents. At a minimum, the report must 
include: 
 Descriptive statistics, including the amount of ransom requested, duration of the incident, and 
overall monetary cost to taxpayers of the incident. 
 A detailed statistical analysis of the circumstances that lead to the ransomware incident 
which does not include the name of the state agency or local government, network 
information, or system identifying information.  BILL: CS/CS/SB 1670   	Page 15 
 
 Statistical analysis of the level of cybersecurity employee training and frequency of data 
backup for the state agencies or local governments that reported incidents. 
 Specific issues identified with current policy, procedure, rule, or statute and 
recommendations to address those issues. 
 Other recommendations to prevent ransomware incidents. 
 The bill specifies that, for purposes of the CAC’s charter, the term “state agency” includes 
the Department of Legal Affairs, the Department of Agriculture and Consumer Services, and 
the Department of Financial Services. 
 
Ransomware Offense 
The bill provides that a person who willfully, knowingly, and without authorization introduces a 
computer contaminant that gains unauthorized access to, encrypts, modifies, or otherwise renders 
unavailable data, programs, or supporting documentation residing or existing within a computer, 
computer system, computer network, or electronic device owned or operated by a government 
entity46 and demands a ransom to prevent the publication of or restore access to the data, 
programs, or supporting documentation or to otherwise remediate the impact of the computer 
contaminant commits a ransomware offense. The bill provides that a ransomware offense is 
punishable as a first degree felony. The bill further provides that an employee or contractor of a 
government entity, with access to the government entity’s network, who willfully and knowingly 
aids or abets another in the commission of a ransomware offense against the government entity 
commits a felony of the first degree. In addition to any other penalties imposed, the convicted 
person must pay a fine equal to twice the amount demanded in the ransomware offense, the 
proceeds of which will be deposited into the General Revenue Fund. 
 
IV. Constitutional Issues: 
A. Municipality/County Mandates Restrictions: 
The county/municipality mandates provision of Art. VII, s. 18 of the Florida Constitution 
may apply because the bill places cybersecurity related requirements on local 
governments, including completing cybersecurity trainings, adopting cybersecurity 
standards, reporting ransomware and certain cybersecurity incidents, and submitting 
after-action reports; however, an exemption may apply if the costs related to those 
cybersecurity requirements are insignificant. An exception may apply because similarly 
situated entities are required to comply with the same cybersecurity requirements and the 
bill provides an important state interest determination. An exception may also apply 
because the General Appropriations Act provides estimated funds to cover the mandate. 
 
 
The fiscal impact to the local governments is indeterminate as the number of impacted 
individuals is unknown.  
 
The bill does not clearly define which entities within local government are covered by the 
requirements. For Fiscal Year 2020-2021, the total FTEs employed in Florida’s 67  BILL: CS/CS/SB 1670   	Page 16 
 
counties was reported as 158,685
59
 and, for municipal governments, the total FTEs 
reported was 107,137.
60
  
 
Expenditure of funds would be required of all counties and local governments similarly 
situated in that all counties and local governments would be required to comply in the 
same manner, which may remove the local mandate issue. Additionally, the fiscal impact 
to the local government may be insignificant depending on the format and type of 
training developed. Whether this requirement would meet the threshold to be considered 
a mandate is indeterminate. 
 
The bill includes a statement that the act fulfills an important state interest.  
B. Public Records/Open Meetings Issues: 
None. 
C. Trust Funds Restrictions: 
None. 
D. State Tax or Fee Increases: 
None. 
E. Other Constitutional Issues: 
None. 
V. Fiscal Impact Statement: 
A. Tax/Fee Issues: 
None. 
B. Private Sector Impact: 
None. 
C. Government Sector Impact: 
There is an indeterminate fiscal impact associated with providing the training to local 
government employees. The cost will be determined by the format and delivery of the 
training, as well as the number of individuals out of the total county or local government 
                                                
59
 Office of Economic and Demographic Research, Local Government Financial Reports, County Government Reports, 2020 
Reporting Cycle Results, pg. 12, available at http://edr.state.fl.us/Content/local-government/local-govt-
reporting/2020CountyReport-DataSetwithMetrics.pdf (last visited Feb. 8, 2022). 
60
 Office of Economic and Demographic Research, Local Government Financial Reports, Municipal Government Reports, 
2020 Reporting Cycle Results, pg. 67, available at http://edr.state.fl.us/Content/local-government/local-govt-
reporting/2020MunicipalReport-DataSetwithMetrics.pdf (last visited Feb. 8, 2022).  BILL: CS/CS/SB 1670   	Page 17 
 
workforce that would be required to participate in either the new employee component or 
the annual training. 
 
There may be long-term indeterminate savings in funds and resources to the state, local, 
or county governments if the cybersecurity trainings result in fewer cybersecurity attacks, 
reductions in the loss of data, or mitigation of third party computer breaches. 
 
VI. Technical Deficiencies: 
In describing the types of training to be delivered to local government employees, Section 2 of 
the bill does not define “persons with access to highly sensitive information” who would undergo 
additional training.  
 
It is also unclear as to who is responsible for the delivery of the referenced cybersecurity 
training. Section (2) states that the Florida Digital Service may provide the training in 
collaboration with other defined entities.  The statement implies that the Florida Digital Service 
is tasked with providing the training to applicable local government employees.   
VII. Related Issues: 
The bill requires that training be created and provided for certain employees of state and local 
government. The definition of local government is not provided. State statutes provide several 
provisions or definitions of “local government” depending on the context or legislative intent, 
which include or exclude other public institutions, such as schools, higher education entities, 
special districts, or councils.  
VIII. Statutes Affected: 
This bill substantially amends section 282.318 of the Florida Statutes. 
 
This bill creates section 282.3185 of the Florida Statutes. 
IX. Additional Information: 
A. Committee Substitute – Statement of Substantial Changes: 
(Summarizing differences between the Committee Substitute and the prior version of the bill.) 
CS/CS by Appropriations on February 28, 2022: 
The committee substitute: 
 Requires state agencies and local government entities to report cybersecurity and 
ransomware incidents to the Cybersecurity Operations Center (CSOC) and the 
Cybercrime office of the Department of Law Enforcement; 
 Defines the level of severity of a cybersecurity incident in accordance with the U.S. 
Department of Homeland Security’s National Cyber Incident Response Plan; 
 Requires the advanced cybersecurity training offered to specified state agency and 
local government employees to include training on the cybersecurity incident severity 
levels;  BILL: CS/CS/SB 1670   	Page 18 
 
 Differentiates reporting requirements based on the level of severity of a cybersecurity 
incident; 
 Requires the Legislature to only be notified of high severity level cybersecurity 
incidents; 
 Requires the CSOC to provide the Legislature and Cybersecurity Advisory Council 
(CAC) with a consolidated incident report on a quarterly basis; 
 Requires local government entities to adopt cybersecurity standards that align with 
the National Institute for Standards and Technology and to provide notification to the 
Florida Digital Service when such standards are adopted; 
 Expands the purpose of the CAC to include advising local governments on 
cybersecurity and requires the CAC to examine reported cybersecurity and 
ransomware incidents to develop best practice recommendations; 
 Requires the CAC to submit an annual comprehensive report regarding ransomware 
to the Governor and Legislature; and 
 Establishes penalties and fines for certain ransomware offenses against a government 
entity. 
 
CS by Military and Veterans Affairs, Space, and Domestic Security on February 8, 
2022: 
The Committee adopted a CS which: 
 Modifies s. 282.318, F.S., to direct the Florida Digital Service (FDS) to provide 
cybersecurity training for all state agency technology employees and employees with 
access to highly sensitive information within the first 30 days of employment and 
then annually thereafter; 
 Defines “local government” to mean any county or municipality”; 
 Creates s. 282.3185, F.S., and directs FDS to develop a basic and advanced 
cybersecurity training curriculum for local government employees with access to the 
local network or have access to highly sensitive information for completion within 30 
days of employment and then annually thereafter; and 
 Allows training to be provided by the Cybercrime Office of the FDLE, a private 
sector entity, or an institution of the state university system. 
 
The CS includes a statement that the Legislature finds that the act fulfills an important 
state interest. 
 
The effective date of the act is July 1, 2022. 
B. Amendments: 
None. 
This Senate Bill Analysis does not reflect the intent or official position of the bill’s introducer or the Florida Senate.